1d9ae7f2bSJakub Kicinski /*
29816dd35SJakub Kicinski  * Copyright (C) 2016-2018 Netronome Systems, Inc.
3d9ae7f2bSJakub Kicinski  *
4d9ae7f2bSJakub Kicinski  * This software is dual licensed under the GNU General License Version 2,
5d9ae7f2bSJakub Kicinski  * June 1991 as shown in the file COPYING in the top-level directory of this
6d9ae7f2bSJakub Kicinski  * source tree or the BSD 2-Clause License provided below.  You have the
7d9ae7f2bSJakub Kicinski  * option to license this software under the complete terms of either license.
8d9ae7f2bSJakub Kicinski  *
9d9ae7f2bSJakub Kicinski  * The BSD 2-Clause License:
10d9ae7f2bSJakub Kicinski  *
11d9ae7f2bSJakub Kicinski  *     Redistribution and use in source and binary forms, with or
12d9ae7f2bSJakub Kicinski  *     without modification, are permitted provided that the following
13d9ae7f2bSJakub Kicinski  *     conditions are met:
14d9ae7f2bSJakub Kicinski  *
15d9ae7f2bSJakub Kicinski  *      1. Redistributions of source code must retain the above
16d9ae7f2bSJakub Kicinski  *         copyright notice, this list of conditions and the following
17d9ae7f2bSJakub Kicinski  *         disclaimer.
18d9ae7f2bSJakub Kicinski  *
19d9ae7f2bSJakub Kicinski  *      2. Redistributions in binary form must reproduce the above
20d9ae7f2bSJakub Kicinski  *         copyright notice, this list of conditions and the following
21d9ae7f2bSJakub Kicinski  *         disclaimer in the documentation and/or other materials
22d9ae7f2bSJakub Kicinski  *         provided with the distribution.
23d9ae7f2bSJakub Kicinski  *
24d9ae7f2bSJakub Kicinski  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25d9ae7f2bSJakub Kicinski  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26d9ae7f2bSJakub Kicinski  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27d9ae7f2bSJakub Kicinski  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28d9ae7f2bSJakub Kicinski  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29d9ae7f2bSJakub Kicinski  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30d9ae7f2bSJakub Kicinski  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31d9ae7f2bSJakub Kicinski  * SOFTWARE.
32d9ae7f2bSJakub Kicinski  */
33d9ae7f2bSJakub Kicinski 
34d9ae7f2bSJakub Kicinski #define pr_fmt(fmt)	"NFP net bpf: " fmt
35d9ae7f2bSJakub Kicinski 
360d49eaf4SJakub Kicinski #include <linux/bug.h>
37d9ae7f2bSJakub Kicinski #include <linux/bpf.h>
38d9ae7f2bSJakub Kicinski #include <linux/filter.h>
392a952b03SJiong Wang #include <linux/kernel.h>
40d9ae7f2bSJakub Kicinski #include <linux/pkt_cls.h>
412a952b03SJiong Wang #include <linux/reciprocal_div.h>
42d9ae7f2bSJakub Kicinski #include <linux/unistd.h>
43d9ae7f2bSJakub Kicinski 
44d9ae7f2bSJakub Kicinski #include "main.h"
45d9ae7f2bSJakub Kicinski #include "../nfp_asm.h"
46d985888fSJakub Kicinski #include "../nfp_net_ctrl.h"
47d9ae7f2bSJakub Kicinski 
48d9ae7f2bSJakub Kicinski /* --- NFP prog --- */
49d9ae7f2bSJakub Kicinski /* Foreach "multiple" entries macros provide pos and next<n> pointers.
50d9ae7f2bSJakub Kicinski  * It's safe to modify the next pointers (but not pos).
51d9ae7f2bSJakub Kicinski  */
52d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk2(nfp_prog, pos, next)			\
53d9ae7f2bSJakub Kicinski 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
54d9ae7f2bSJakub Kicinski 	     next = list_next_entry(pos, l);			\
55d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &pos->l &&			\
56d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next->l;			\
57d9ae7f2bSJakub Kicinski 	     pos = nfp_meta_next(pos),				\
58d9ae7f2bSJakub Kicinski 	     next = nfp_meta_next(pos))
59d9ae7f2bSJakub Kicinski 
60d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2)		\
61d9ae7f2bSJakub Kicinski 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
62d9ae7f2bSJakub Kicinski 	     next = list_next_entry(pos, l),			\
63d9ae7f2bSJakub Kicinski 	     next2 = list_next_entry(next, l);			\
64d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &pos->l &&			\
65d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next->l &&			\
66d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next2->l;			\
67d9ae7f2bSJakub Kicinski 	     pos = nfp_meta_next(pos),				\
68d9ae7f2bSJakub Kicinski 	     next = nfp_meta_next(pos),				\
69d9ae7f2bSJakub Kicinski 	     next2 = nfp_meta_next(next))
70d9ae7f2bSJakub Kicinski 
71d9ae7f2bSJakub Kicinski static bool
72d9ae7f2bSJakub Kicinski nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
73d9ae7f2bSJakub Kicinski {
74d9ae7f2bSJakub Kicinski 	return meta->l.prev != &nfp_prog->insns;
75d9ae7f2bSJakub Kicinski }
76d9ae7f2bSJakub Kicinski 
77d9ae7f2bSJakub Kicinski static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
78d9ae7f2bSJakub Kicinski {
79e8a4796eSJakub Kicinski 	if (nfp_prog->__prog_alloc_len / sizeof(u64) == nfp_prog->prog_len) {
80e8a4796eSJakub Kicinski 		pr_warn("instruction limit reached (%u NFP instructions)\n",
81e8a4796eSJakub Kicinski 			nfp_prog->prog_len);
82d9ae7f2bSJakub Kicinski 		nfp_prog->error = -ENOSPC;
83d9ae7f2bSJakub Kicinski 		return;
84d9ae7f2bSJakub Kicinski 	}
85d9ae7f2bSJakub Kicinski 
86d9ae7f2bSJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len] = insn;
87d9ae7f2bSJakub Kicinski 	nfp_prog->prog_len++;
88d9ae7f2bSJakub Kicinski }
89d9ae7f2bSJakub Kicinski 
90d9ae7f2bSJakub Kicinski static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
91d9ae7f2bSJakub Kicinski {
922314fe9eSJakub Kicinski 	return nfp_prog->prog_len;
93d9ae7f2bSJakub Kicinski }
94d9ae7f2bSJakub Kicinski 
950d49eaf4SJakub Kicinski static bool
960d49eaf4SJakub Kicinski nfp_prog_confirm_current_offset(struct nfp_prog *nfp_prog, unsigned int off)
970d49eaf4SJakub Kicinski {
980d49eaf4SJakub Kicinski 	/* If there is a recorded error we may have dropped instructions;
990d49eaf4SJakub Kicinski 	 * that doesn't have to be due to translator bug, and the translation
1000d49eaf4SJakub Kicinski 	 * will fail anyway, so just return OK.
1010d49eaf4SJakub Kicinski 	 */
1020d49eaf4SJakub Kicinski 	if (nfp_prog->error)
1030d49eaf4SJakub Kicinski 		return true;
1040d49eaf4SJakub Kicinski 	return !WARN_ON_ONCE(nfp_prog_current_offset(nfp_prog) != off);
1050d49eaf4SJakub Kicinski }
1060d49eaf4SJakub Kicinski 
107d9ae7f2bSJakub Kicinski /* --- Emitters --- */
108d9ae7f2bSJakub Kicinski static void
109d9ae7f2bSJakub Kicinski __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
110b556ddd9SJakub Kicinski 	   u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, enum cmd_ctx_swap ctx,
111b556ddd9SJakub Kicinski 	   bool indir)
112d9ae7f2bSJakub Kicinski {
113d9ae7f2bSJakub Kicinski 	u64 insn;
114d9ae7f2bSJakub Kicinski 
115d9ae7f2bSJakub Kicinski 	insn =	FIELD_PREP(OP_CMD_A_SRC, areg) |
116d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_CTX, ctx) |
117d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_B_SRC, breg) |
118d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
119d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_XFER, xfer) |
120d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_CNT, size) |
121b556ddd9SJakub Kicinski 		FIELD_PREP(OP_CMD_SIG, ctx != CMD_CTX_NO_SWAP) |
122d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
1235468a8b9SJakub Kicinski 		FIELD_PREP(OP_CMD_INDIR, indir) |
124d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_MODE, mode);
125d9ae7f2bSJakub Kicinski 
126d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
127d9ae7f2bSJakub Kicinski }
128d9ae7f2bSJakub Kicinski 
129d9ae7f2bSJakub Kicinski static void
1305468a8b9SJakub Kicinski emit_cmd_any(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
131b556ddd9SJakub Kicinski 	     swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx, bool indir)
132d9ae7f2bSJakub Kicinski {
133d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
134d9ae7f2bSJakub Kicinski 	int err;
135d9ae7f2bSJakub Kicinski 
136d9ae7f2bSJakub Kicinski 	err = swreg_to_restricted(reg_none(), lreg, rreg, &reg, false);
137d9ae7f2bSJakub Kicinski 	if (err) {
138d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
139d9ae7f2bSJakub Kicinski 		return;
140d9ae7f2bSJakub Kicinski 	}
141d9ae7f2bSJakub Kicinski 	if (reg.swap) {
142d9ae7f2bSJakub Kicinski 		pr_err("cmd can't swap arguments\n");
143d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
144d9ae7f2bSJakub Kicinski 		return;
145d9ae7f2bSJakub Kicinski 	}
146995e101fSJakub Kicinski 	if (reg.dst_lmextn || reg.src_lmextn) {
147995e101fSJakub Kicinski 		pr_err("cmd can't use LMextn\n");
148995e101fSJakub Kicinski 		nfp_prog->error = -EFAULT;
149995e101fSJakub Kicinski 		return;
150995e101fSJakub Kicinski 	}
151d9ae7f2bSJakub Kicinski 
152b556ddd9SJakub Kicinski 	__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, ctx,
1535468a8b9SJakub Kicinski 		   indir);
1545468a8b9SJakub Kicinski }
1555468a8b9SJakub Kicinski 
1565468a8b9SJakub Kicinski static void
1575468a8b9SJakub Kicinski emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
158b556ddd9SJakub Kicinski 	 swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
1595468a8b9SJakub Kicinski {
160b556ddd9SJakub Kicinski 	emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, false);
161d9ae7f2bSJakub Kicinski }
162d9ae7f2bSJakub Kicinski 
163d9ae7f2bSJakub Kicinski static void
1649879a381SJiong Wang emit_cmd_indir(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
165b556ddd9SJakub Kicinski 	       swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
1669879a381SJiong Wang {
167b556ddd9SJakub Kicinski 	emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, true);
1689879a381SJiong Wang }
1699879a381SJiong Wang 
1709879a381SJiong Wang static void
171d9ae7f2bSJakub Kicinski __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
172d9ae7f2bSJakub Kicinski 	  enum br_ctx_signal_state css, u16 addr, u8 defer)
173d9ae7f2bSJakub Kicinski {
174d9ae7f2bSJakub Kicinski 	u16 addr_lo, addr_hi;
175d9ae7f2bSJakub Kicinski 	u64 insn;
176d9ae7f2bSJakub Kicinski 
177d9ae7f2bSJakub Kicinski 	addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
178d9ae7f2bSJakub Kicinski 	addr_hi = addr != addr_lo;
179d9ae7f2bSJakub Kicinski 
180d9ae7f2bSJakub Kicinski 	insn = OP_BR_BASE |
181d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_MASK, mask) |
182d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
183d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_CSS, css) |
184d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_DEFBR, defer) |
185d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
186d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
187d9ae7f2bSJakub Kicinski 
188d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
189d9ae7f2bSJakub Kicinski }
190d9ae7f2bSJakub Kicinski 
1912314fe9eSJakub Kicinski static void
1922314fe9eSJakub Kicinski emit_br_relo(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer,
1932314fe9eSJakub Kicinski 	     enum nfp_relo_type relo)
194d9ae7f2bSJakub Kicinski {
1952314fe9eSJakub Kicinski 	if (mask == BR_UNC && defer > 2) {
196d9ae7f2bSJakub Kicinski 		pr_err("BUG: branch defer out of bounds %d\n", defer);
197d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
198d9ae7f2bSJakub Kicinski 		return;
199d9ae7f2bSJakub Kicinski 	}
2002314fe9eSJakub Kicinski 
2012314fe9eSJakub Kicinski 	__emit_br(nfp_prog, mask,
2022314fe9eSJakub Kicinski 		  mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
2032314fe9eSJakub Kicinski 		  BR_CSS_NONE, addr, defer);
2042314fe9eSJakub Kicinski 
2052314fe9eSJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
2062314fe9eSJakub Kicinski 		FIELD_PREP(OP_RELO_TYPE, relo);
207d9ae7f2bSJakub Kicinski }
208d9ae7f2bSJakub Kicinski 
209d9ae7f2bSJakub Kicinski static void
210d9ae7f2bSJakub Kicinski emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
211d9ae7f2bSJakub Kicinski {
2122314fe9eSJakub Kicinski 	emit_br_relo(nfp_prog, mask, addr, defer, RELO_BR_REL);
213d9ae7f2bSJakub Kicinski }
214d9ae7f2bSJakub Kicinski 
215d9ae7f2bSJakub Kicinski static void
216991f5b36SJiong Wang __emit_br_bit(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 addr, u8 defer,
217991f5b36SJiong Wang 	      bool set, bool src_lmextn)
218991f5b36SJiong Wang {
219991f5b36SJiong Wang 	u16 addr_lo, addr_hi;
220991f5b36SJiong Wang 	u64 insn;
221991f5b36SJiong Wang 
222991f5b36SJiong Wang 	addr_lo = addr & (OP_BR_BIT_ADDR_LO >> __bf_shf(OP_BR_BIT_ADDR_LO));
223991f5b36SJiong Wang 	addr_hi = addr != addr_lo;
224991f5b36SJiong Wang 
225991f5b36SJiong Wang 	insn = OP_BR_BIT_BASE |
226991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_A_SRC, areg) |
227991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_B_SRC, breg) |
228991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_BV, set) |
229991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_DEFBR, defer) |
230991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_ADDR_LO, addr_lo) |
231991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_ADDR_HI, addr_hi) |
232991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_SRC_LMEXTN, src_lmextn);
233991f5b36SJiong Wang 
234991f5b36SJiong Wang 	nfp_prog_push(nfp_prog, insn);
235991f5b36SJiong Wang }
236991f5b36SJiong Wang 
237991f5b36SJiong Wang static void
238991f5b36SJiong Wang emit_br_bit_relo(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr,
239991f5b36SJiong Wang 		 u8 defer, bool set, enum nfp_relo_type relo)
240991f5b36SJiong Wang {
241991f5b36SJiong Wang 	struct nfp_insn_re_regs reg;
242991f5b36SJiong Wang 	int err;
243991f5b36SJiong Wang 
244991f5b36SJiong Wang 	/* NOTE: The bit to test is specified as an rotation amount, such that
245991f5b36SJiong Wang 	 *	 the bit to test will be placed on the MSB of the result when
246991f5b36SJiong Wang 	 *	 doing a rotate right. For bit X, we need right rotate X + 1.
247991f5b36SJiong Wang 	 */
248991f5b36SJiong Wang 	bit += 1;
249991f5b36SJiong Wang 
250991f5b36SJiong Wang 	err = swreg_to_restricted(reg_none(), src, reg_imm(bit), &reg, false);
251991f5b36SJiong Wang 	if (err) {
252991f5b36SJiong Wang 		nfp_prog->error = err;
253991f5b36SJiong Wang 		return;
254991f5b36SJiong Wang 	}
255991f5b36SJiong Wang 
256991f5b36SJiong Wang 	__emit_br_bit(nfp_prog, reg.areg, reg.breg, addr, defer, set,
257991f5b36SJiong Wang 		      reg.src_lmextn);
258991f5b36SJiong Wang 
259991f5b36SJiong Wang 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
260991f5b36SJiong Wang 		FIELD_PREP(OP_RELO_TYPE, relo);
261991f5b36SJiong Wang }
262991f5b36SJiong Wang 
263991f5b36SJiong Wang static void
264991f5b36SJiong Wang emit_br_bset(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr, u8 defer)
265991f5b36SJiong Wang {
266991f5b36SJiong Wang 	emit_br_bit_relo(nfp_prog, src, bit, addr, defer, true, RELO_BR_REL);
267991f5b36SJiong Wang }
268991f5b36SJiong Wang 
269991f5b36SJiong Wang static void
270389f263bSQuentin Monnet __emit_br_alu(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
271389f263bSQuentin Monnet 	      u8 defer, bool dst_lmextn, bool src_lmextn)
272389f263bSQuentin Monnet {
273389f263bSQuentin Monnet 	u64 insn;
274389f263bSQuentin Monnet 
275389f263bSQuentin Monnet 	insn = OP_BR_ALU_BASE |
276389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_A_SRC, areg) |
277389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_B_SRC, breg) |
278389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_DEFBR, defer) |
279389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_IMM_HI, imm_hi) |
280389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_SRC_LMEXTN, src_lmextn) |
281389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_DST_LMEXTN, dst_lmextn);
282389f263bSQuentin Monnet 
283389f263bSQuentin Monnet 	nfp_prog_push(nfp_prog, insn);
284389f263bSQuentin Monnet }
285389f263bSQuentin Monnet 
286389f263bSQuentin Monnet static void emit_rtn(struct nfp_prog *nfp_prog, swreg base, u8 defer)
287389f263bSQuentin Monnet {
288389f263bSQuentin Monnet 	struct nfp_insn_ur_regs reg;
289389f263bSQuentin Monnet 	int err;
290389f263bSQuentin Monnet 
291389f263bSQuentin Monnet 	err = swreg_to_unrestricted(reg_none(), base, reg_imm(0), &reg);
292389f263bSQuentin Monnet 	if (err) {
293389f263bSQuentin Monnet 		nfp_prog->error = err;
294389f263bSQuentin Monnet 		return;
295389f263bSQuentin Monnet 	}
296389f263bSQuentin Monnet 
297389f263bSQuentin Monnet 	__emit_br_alu(nfp_prog, reg.areg, reg.breg, 0, defer, reg.dst_lmextn,
298389f263bSQuentin Monnet 		      reg.src_lmextn);
299389f263bSQuentin Monnet }
300389f263bSQuentin Monnet 
301389f263bSQuentin Monnet static void
302d9ae7f2bSJakub Kicinski __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
303d9ae7f2bSJakub Kicinski 	     enum immed_width width, bool invert,
304995e101fSJakub Kicinski 	     enum immed_shift shift, bool wr_both,
305995e101fSJakub Kicinski 	     bool dst_lmextn, bool src_lmextn)
306d9ae7f2bSJakub Kicinski {
307d9ae7f2bSJakub Kicinski 	u64 insn;
308d9ae7f2bSJakub Kicinski 
309d9ae7f2bSJakub Kicinski 	insn = OP_IMMED_BASE |
310d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_A_SRC, areg) |
311d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_B_SRC, breg) |
312d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_IMM, imm_hi) |
313d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_WIDTH, width) |
314d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_INV, invert) |
315d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_SHIFT, shift) |
316995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_WR_AB, wr_both) |
317995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) |
318995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn);
319d9ae7f2bSJakub Kicinski 
320d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
321d9ae7f2bSJakub Kicinski }
322d9ae7f2bSJakub Kicinski 
323d9ae7f2bSJakub Kicinski static void
324b3f868dfSJakub Kicinski emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
325d9ae7f2bSJakub Kicinski 	   enum immed_width width, bool invert, enum immed_shift shift)
326d9ae7f2bSJakub Kicinski {
327d9ae7f2bSJakub Kicinski 	struct nfp_insn_ur_regs reg;
328d9ae7f2bSJakub Kicinski 	int err;
329d9ae7f2bSJakub Kicinski 
330b3f868dfSJakub Kicinski 	if (swreg_type(dst) == NN_REG_IMM) {
331d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
332d9ae7f2bSJakub Kicinski 		return;
333d9ae7f2bSJakub Kicinski 	}
334d9ae7f2bSJakub Kicinski 
335d9ae7f2bSJakub Kicinski 	err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), &reg);
336d9ae7f2bSJakub Kicinski 	if (err) {
337d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
338d9ae7f2bSJakub Kicinski 		return;
339d9ae7f2bSJakub Kicinski 	}
340d9ae7f2bSJakub Kicinski 
3413239e7bbSJiong Wang 	/* Use reg.dst when destination is No-Dest. */
3423239e7bbSJiong Wang 	__emit_immed(nfp_prog,
3433239e7bbSJiong Wang 		     swreg_type(dst) == NN_REG_NONE ? reg.dst : reg.areg,
3443239e7bbSJiong Wang 		     reg.breg, imm >> 8, width, invert, shift,
3453239e7bbSJiong Wang 		     reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
346d9ae7f2bSJakub Kicinski }
347d9ae7f2bSJakub Kicinski 
348d9ae7f2bSJakub Kicinski static void
349d9ae7f2bSJakub Kicinski __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
350d9ae7f2bSJakub Kicinski 	   enum shf_sc sc, u8 shift,
351995e101fSJakub Kicinski 	   u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both,
352995e101fSJakub Kicinski 	   bool dst_lmextn, bool src_lmextn)
353d9ae7f2bSJakub Kicinski {
354d9ae7f2bSJakub Kicinski 	u64 insn;
355d9ae7f2bSJakub Kicinski 
356d9ae7f2bSJakub Kicinski 	if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
357d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
358d9ae7f2bSJakub Kicinski 		return;
359d9ae7f2bSJakub Kicinski 	}
360d9ae7f2bSJakub Kicinski 
361d9ae7f2bSJakub Kicinski 	if (sc == SHF_SC_L_SHF)
362d9ae7f2bSJakub Kicinski 		shift = 32 - shift;
363d9ae7f2bSJakub Kicinski 
364d9ae7f2bSJakub Kicinski 	insn = OP_SHF_BASE |
365d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_A_SRC, areg) |
366d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SC, sc) |
367d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_B_SRC, breg) |
368d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_I8, i8) |
369d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SW, sw) |
370d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_DST, dst) |
371d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SHIFT, shift) |
372d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_OP, op) |
373d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
374995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_WR_AB, wr_both) |
375995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) |
376995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn);
377d9ae7f2bSJakub Kicinski 
378d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
379d9ae7f2bSJakub Kicinski }
380d9ae7f2bSJakub Kicinski 
381d9ae7f2bSJakub Kicinski static void
382b3f868dfSJakub Kicinski emit_shf(struct nfp_prog *nfp_prog, swreg dst,
383b3f868dfSJakub Kicinski 	 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
384d9ae7f2bSJakub Kicinski {
385d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
386d9ae7f2bSJakub Kicinski 	int err;
387d9ae7f2bSJakub Kicinski 
388d9ae7f2bSJakub Kicinski 	err = swreg_to_restricted(dst, lreg, rreg, &reg, true);
389d9ae7f2bSJakub Kicinski 	if (err) {
390d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
391d9ae7f2bSJakub Kicinski 		return;
392d9ae7f2bSJakub Kicinski 	}
393d9ae7f2bSJakub Kicinski 
394d9ae7f2bSJakub Kicinski 	__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
395995e101fSJakub Kicinski 		   reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both,
396995e101fSJakub Kicinski 		   reg.dst_lmextn, reg.src_lmextn);
397d9ae7f2bSJakub Kicinski }
398d9ae7f2bSJakub Kicinski 
399d9ae7f2bSJakub Kicinski static void
400991f5b36SJiong Wang emit_shf_indir(struct nfp_prog *nfp_prog, swreg dst,
401991f5b36SJiong Wang 	       swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc)
402991f5b36SJiong Wang {
403991f5b36SJiong Wang 	if (sc == SHF_SC_R_ROT) {
404991f5b36SJiong Wang 		pr_err("indirect shift is not allowed on rotation\n");
405991f5b36SJiong Wang 		nfp_prog->error = -EFAULT;
406991f5b36SJiong Wang 		return;
407991f5b36SJiong Wang 	}
408991f5b36SJiong Wang 
409991f5b36SJiong Wang 	emit_shf(nfp_prog, dst, lreg, op, rreg, sc, 0);
410991f5b36SJiong Wang }
411991f5b36SJiong Wang 
412991f5b36SJiong Wang static void
413d9ae7f2bSJakub Kicinski __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
414995e101fSJakub Kicinski 	   u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both,
415995e101fSJakub Kicinski 	   bool dst_lmextn, bool src_lmextn)
416d9ae7f2bSJakub Kicinski {
417d9ae7f2bSJakub Kicinski 	u64 insn;
418d9ae7f2bSJakub Kicinski 
419d9ae7f2bSJakub Kicinski 	insn = OP_ALU_BASE |
420d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_A_SRC, areg) |
421d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_B_SRC, breg) |
422d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_DST, dst) |
423d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_SW, swap) |
424d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_OP, op) |
425d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
426995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_WR_AB, wr_both) |
427995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) |
428995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn);
429d9ae7f2bSJakub Kicinski 
430d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
431d9ae7f2bSJakub Kicinski }
432d9ae7f2bSJakub Kicinski 
433d9ae7f2bSJakub Kicinski static void
434b3f868dfSJakub Kicinski emit_alu(struct nfp_prog *nfp_prog, swreg dst,
435b3f868dfSJakub Kicinski 	 swreg lreg, enum alu_op op, swreg rreg)
436d9ae7f2bSJakub Kicinski {
437d9ae7f2bSJakub Kicinski 	struct nfp_insn_ur_regs reg;
438d9ae7f2bSJakub Kicinski 	int err;
439d9ae7f2bSJakub Kicinski 
440d9ae7f2bSJakub Kicinski 	err = swreg_to_unrestricted(dst, lreg, rreg, &reg);
441d9ae7f2bSJakub Kicinski 	if (err) {
442d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
443d9ae7f2bSJakub Kicinski 		return;
444d9ae7f2bSJakub Kicinski 	}
445d9ae7f2bSJakub Kicinski 
446d9ae7f2bSJakub Kicinski 	__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
447995e101fSJakub Kicinski 		   reg.areg, op, reg.breg, reg.swap, reg.wr_both,
448995e101fSJakub Kicinski 		   reg.dst_lmextn, reg.src_lmextn);
449d9ae7f2bSJakub Kicinski }
450d9ae7f2bSJakub Kicinski 
451d9ae7f2bSJakub Kicinski static void
452d3d23fdbSJiong Wang __emit_mul(struct nfp_prog *nfp_prog, enum alu_dst_ab dst_ab, u16 areg,
453d3d23fdbSJiong Wang 	   enum mul_type type, enum mul_step step, u16 breg, bool swap,
454d3d23fdbSJiong Wang 	   bool wr_both, bool dst_lmextn, bool src_lmextn)
455d3d23fdbSJiong Wang {
456d3d23fdbSJiong Wang 	u64 insn;
457d3d23fdbSJiong Wang 
458d3d23fdbSJiong Wang 	insn = OP_MUL_BASE |
459d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_A_SRC, areg) |
460d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_B_SRC, breg) |
461d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_STEP, step) |
462d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_DST_AB, dst_ab) |
463d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_SW, swap) |
464d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_TYPE, type) |
465d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_WR_AB, wr_both) |
466d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_SRC_LMEXTN, src_lmextn) |
467d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_DST_LMEXTN, dst_lmextn);
468d3d23fdbSJiong Wang 
469d3d23fdbSJiong Wang 	nfp_prog_push(nfp_prog, insn);
470d3d23fdbSJiong Wang }
471d3d23fdbSJiong Wang 
472d3d23fdbSJiong Wang static void
473d3d23fdbSJiong Wang emit_mul(struct nfp_prog *nfp_prog, swreg lreg, enum mul_type type,
474d3d23fdbSJiong Wang 	 enum mul_step step, swreg rreg)
475d3d23fdbSJiong Wang {
476d3d23fdbSJiong Wang 	struct nfp_insn_ur_regs reg;
477d3d23fdbSJiong Wang 	u16 areg;
478d3d23fdbSJiong Wang 	int err;
479d3d23fdbSJiong Wang 
480d3d23fdbSJiong Wang 	if (type == MUL_TYPE_START && step != MUL_STEP_NONE) {
481d3d23fdbSJiong Wang 		nfp_prog->error = -EINVAL;
482d3d23fdbSJiong Wang 		return;
483d3d23fdbSJiong Wang 	}
484d3d23fdbSJiong Wang 
485d3d23fdbSJiong Wang 	if (step == MUL_LAST || step == MUL_LAST_2) {
486d3d23fdbSJiong Wang 		/* When type is step and step Number is LAST or LAST2, left
487d3d23fdbSJiong Wang 		 * source is used as destination.
488d3d23fdbSJiong Wang 		 */
489d3d23fdbSJiong Wang 		err = swreg_to_unrestricted(lreg, reg_none(), rreg, &reg);
490d3d23fdbSJiong Wang 		areg = reg.dst;
491d3d23fdbSJiong Wang 	} else {
492d3d23fdbSJiong Wang 		err = swreg_to_unrestricted(reg_none(), lreg, rreg, &reg);
493d3d23fdbSJiong Wang 		areg = reg.areg;
494d3d23fdbSJiong Wang 	}
495d3d23fdbSJiong Wang 
496d3d23fdbSJiong Wang 	if (err) {
497d3d23fdbSJiong Wang 		nfp_prog->error = err;
498d3d23fdbSJiong Wang 		return;
499d3d23fdbSJiong Wang 	}
500d3d23fdbSJiong Wang 
501d3d23fdbSJiong Wang 	__emit_mul(nfp_prog, reg.dst_ab, areg, type, step, reg.breg, reg.swap,
502d3d23fdbSJiong Wang 		   reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
503d3d23fdbSJiong Wang }
504d3d23fdbSJiong Wang 
505d3d23fdbSJiong Wang static void
506d9ae7f2bSJakub Kicinski __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
507d9ae7f2bSJakub Kicinski 		u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
508995e101fSJakub Kicinski 		bool zero, bool swap, bool wr_both,
509995e101fSJakub Kicinski 		bool dst_lmextn, bool src_lmextn)
510d9ae7f2bSJakub Kicinski {
511d9ae7f2bSJakub Kicinski 	u64 insn;
512d9ae7f2bSJakub Kicinski 
513d9ae7f2bSJakub Kicinski 	insn = OP_LDF_BASE |
514d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_A_SRC, areg) |
515d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SC, sc) |
516d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_B_SRC, breg) |
517d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_I8, imm8) |
518d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SW, swap) |
519d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_ZF, zero) |
520d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_BMASK, bmask) |
521d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SHF, shift) |
522995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_WR_AB, wr_both) |
523995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) |
524995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn);
525d9ae7f2bSJakub Kicinski 
526d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
527d9ae7f2bSJakub Kicinski }
528d9ae7f2bSJakub Kicinski 
529d9ae7f2bSJakub Kicinski static void
530bc8c80a8SJakub Kicinski emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
531bc8c80a8SJakub Kicinski 		  enum shf_sc sc, u8 shift, bool zero)
532d9ae7f2bSJakub Kicinski {
533d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
534d9ae7f2bSJakub Kicinski 	int err;
535d9ae7f2bSJakub Kicinski 
5362de1be1dSJakub Kicinski 	/* Note: ld_field is special as it uses one of the src regs as dst */
5372de1be1dSJakub Kicinski 	err = swreg_to_restricted(dst, dst, src, &reg, true);
538d9ae7f2bSJakub Kicinski 	if (err) {
539d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
540d9ae7f2bSJakub Kicinski 		return;
541d9ae7f2bSJakub Kicinski 	}
542d9ae7f2bSJakub Kicinski 
543d9ae7f2bSJakub Kicinski 	__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
544995e101fSJakub Kicinski 			reg.i8, zero, reg.swap, reg.wr_both,
545995e101fSJakub Kicinski 			reg.dst_lmextn, reg.src_lmextn);
546d9ae7f2bSJakub Kicinski }
547d9ae7f2bSJakub Kicinski 
548d9ae7f2bSJakub Kicinski static void
549b3f868dfSJakub Kicinski emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
550d9ae7f2bSJakub Kicinski 	      enum shf_sc sc, u8 shift)
551d9ae7f2bSJakub Kicinski {
552bc8c80a8SJakub Kicinski 	emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false);
553d9ae7f2bSJakub Kicinski }
554d9ae7f2bSJakub Kicinski 
5552df03a50SJakub Kicinski static void
5562df03a50SJakub Kicinski __emit_lcsr(struct nfp_prog *nfp_prog, u16 areg, u16 breg, bool wr, u16 addr,
5572df03a50SJakub Kicinski 	    bool dst_lmextn, bool src_lmextn)
5582df03a50SJakub Kicinski {
5592df03a50SJakub Kicinski 	u64 insn;
5602df03a50SJakub Kicinski 
5612df03a50SJakub Kicinski 	insn = OP_LCSR_BASE |
5622df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_A_SRC, areg) |
5632df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_B_SRC, breg) |
5642df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_WRITE, wr) |
565df4a37d8SJakub Kicinski 		FIELD_PREP(OP_LCSR_ADDR, addr / 4) |
5662df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_SRC_LMEXTN, src_lmextn) |
5672df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_DST_LMEXTN, dst_lmextn);
5682df03a50SJakub Kicinski 
5692df03a50SJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
5702df03a50SJakub Kicinski }
5712df03a50SJakub Kicinski 
5722df03a50SJakub Kicinski static void emit_csr_wr(struct nfp_prog *nfp_prog, swreg src, u16 addr)
5732df03a50SJakub Kicinski {
5742df03a50SJakub Kicinski 	struct nfp_insn_ur_regs reg;
5752df03a50SJakub Kicinski 	int err;
5762df03a50SJakub Kicinski 
5772df03a50SJakub Kicinski 	/* This instruction takes immeds instead of reg_none() for the ignored
5782df03a50SJakub Kicinski 	 * operand, but we can't encode 2 immeds in one instr with our normal
5792df03a50SJakub Kicinski 	 * swreg infra so if param is an immed, we encode as reg_none() and
5802df03a50SJakub Kicinski 	 * copy the immed to both operands.
5812df03a50SJakub Kicinski 	 */
5822df03a50SJakub Kicinski 	if (swreg_type(src) == NN_REG_IMM) {
5832df03a50SJakub Kicinski 		err = swreg_to_unrestricted(reg_none(), src, reg_none(), &reg);
5842df03a50SJakub Kicinski 		reg.breg = reg.areg;
5852df03a50SJakub Kicinski 	} else {
5862df03a50SJakub Kicinski 		err = swreg_to_unrestricted(reg_none(), src, reg_imm(0), &reg);
5872df03a50SJakub Kicinski 	}
5882df03a50SJakub Kicinski 	if (err) {
5892df03a50SJakub Kicinski 		nfp_prog->error = err;
5902df03a50SJakub Kicinski 		return;
5912df03a50SJakub Kicinski 	}
5922df03a50SJakub Kicinski 
593df4a37d8SJakub Kicinski 	__emit_lcsr(nfp_prog, reg.areg, reg.breg, true, addr,
5942df03a50SJakub Kicinski 		    false, reg.src_lmextn);
5952df03a50SJakub Kicinski }
5962df03a50SJakub Kicinski 
597df4a37d8SJakub Kicinski /* CSR value is read in following immed[gpr, 0] */
598df4a37d8SJakub Kicinski static void __emit_csr_rd(struct nfp_prog *nfp_prog, u16 addr)
599df4a37d8SJakub Kicinski {
600df4a37d8SJakub Kicinski 	__emit_lcsr(nfp_prog, 0, 0, false, addr, false, false);
601df4a37d8SJakub Kicinski }
602df4a37d8SJakub Kicinski 
6031c03e03fSJakub Kicinski static void emit_nop(struct nfp_prog *nfp_prog)
6041c03e03fSJakub Kicinski {
6051c03e03fSJakub Kicinski 	__emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0);
6061c03e03fSJakub Kicinski }
6071c03e03fSJakub Kicinski 
608d9ae7f2bSJakub Kicinski /* --- Wrappers --- */
609d9ae7f2bSJakub Kicinski static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
610d9ae7f2bSJakub Kicinski {
611d9ae7f2bSJakub Kicinski 	if (!(imm & 0xffff0000)) {
612d9ae7f2bSJakub Kicinski 		*val = imm;
613d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_0B;
614d9ae7f2bSJakub Kicinski 	} else if (!(imm & 0xff0000ff)) {
615d9ae7f2bSJakub Kicinski 		*val = imm >> 8;
616d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_1B;
617d9ae7f2bSJakub Kicinski 	} else if (!(imm & 0x0000ffff)) {
618d9ae7f2bSJakub Kicinski 		*val = imm >> 16;
619d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_2B;
620d9ae7f2bSJakub Kicinski 	} else {
621d9ae7f2bSJakub Kicinski 		return false;
622d9ae7f2bSJakub Kicinski 	}
623d9ae7f2bSJakub Kicinski 
624d9ae7f2bSJakub Kicinski 	return true;
625d9ae7f2bSJakub Kicinski }
626d9ae7f2bSJakub Kicinski 
627b3f868dfSJakub Kicinski static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
628d9ae7f2bSJakub Kicinski {
629d9ae7f2bSJakub Kicinski 	enum immed_shift shift;
630d9ae7f2bSJakub Kicinski 	u16 val;
631d9ae7f2bSJakub Kicinski 
632d9ae7f2bSJakub Kicinski 	if (pack_immed(imm, &val, &shift)) {
633d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
634d9ae7f2bSJakub Kicinski 	} else if (pack_immed(~imm, &val, &shift)) {
635d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
636d9ae7f2bSJakub Kicinski 	} else {
637d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
638d9ae7f2bSJakub Kicinski 			   false, IMMED_SHIFT_0B);
639d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
640d9ae7f2bSJakub Kicinski 			   false, IMMED_SHIFT_2B);
641d9ae7f2bSJakub Kicinski 	}
642d9ae7f2bSJakub Kicinski }
643d9ae7f2bSJakub Kicinski 
64477a3d311SJakub Kicinski static void
64577a3d311SJakub Kicinski wrp_immed_relo(struct nfp_prog *nfp_prog, swreg dst, u32 imm,
64677a3d311SJakub Kicinski 	       enum nfp_relo_type relo)
64777a3d311SJakub Kicinski {
64877a3d311SJakub Kicinski 	if (imm > 0xffff) {
64977a3d311SJakub Kicinski 		pr_err("relocation of a large immediate!\n");
65077a3d311SJakub Kicinski 		nfp_prog->error = -EFAULT;
65177a3d311SJakub Kicinski 		return;
65277a3d311SJakub Kicinski 	}
65377a3d311SJakub Kicinski 	emit_immed(nfp_prog, dst, imm, IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
65477a3d311SJakub Kicinski 
65577a3d311SJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
65677a3d311SJakub Kicinski 		FIELD_PREP(OP_RELO_TYPE, relo);
65777a3d311SJakub Kicinski }
65877a3d311SJakub Kicinski 
659d9ae7f2bSJakub Kicinski /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
660d9ae7f2bSJakub Kicinski  * If the @imm is small enough encode it directly in operand and return
661d9ae7f2bSJakub Kicinski  * otherwise load @imm to a spare register and return its encoding.
662d9ae7f2bSJakub Kicinski  */
663b3f868dfSJakub Kicinski static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
664d9ae7f2bSJakub Kicinski {
665d9ae7f2bSJakub Kicinski 	if (FIELD_FIT(UR_REG_IMM_MAX, imm))
666d9ae7f2bSJakub Kicinski 		return reg_imm(imm);
667d9ae7f2bSJakub Kicinski 
668d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, tmp_reg, imm);
669d9ae7f2bSJakub Kicinski 	return tmp_reg;
670d9ae7f2bSJakub Kicinski }
671d9ae7f2bSJakub Kicinski 
672d9ae7f2bSJakub Kicinski /* re_load_imm_any() - encode immediate or use tmp register (restricted)
673d9ae7f2bSJakub Kicinski  * If the @imm is small enough encode it directly in operand and return
674d9ae7f2bSJakub Kicinski  * otherwise load @imm to a spare register and return its encoding.
675d9ae7f2bSJakub Kicinski  */
676b3f868dfSJakub Kicinski static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
677d9ae7f2bSJakub Kicinski {
678d9ae7f2bSJakub Kicinski 	if (FIELD_FIT(RE_REG_IMM_MAX, imm))
679d9ae7f2bSJakub Kicinski 		return reg_imm(imm);
680d9ae7f2bSJakub Kicinski 
681d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, tmp_reg, imm);
682d9ae7f2bSJakub Kicinski 	return tmp_reg;
683d9ae7f2bSJakub Kicinski }
684d9ae7f2bSJakub Kicinski 
685ff42bb9fSJakub Kicinski static void wrp_nops(struct nfp_prog *nfp_prog, unsigned int count)
686ff42bb9fSJakub Kicinski {
687ff42bb9fSJakub Kicinski 	while (count--)
688ff42bb9fSJakub Kicinski 		emit_nop(nfp_prog);
689ff42bb9fSJakub Kicinski }
690ff42bb9fSJakub Kicinski 
691c000dfb5SJakub Kicinski static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src)
692c000dfb5SJakub Kicinski {
693c000dfb5SJakub Kicinski 	emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src);
694c000dfb5SJakub Kicinski }
695c000dfb5SJakub Kicinski 
696d9ae7f2bSJakub Kicinski static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
697d9ae7f2bSJakub Kicinski {
698c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_both(dst), reg_b(src));
699d9ae7f2bSJakub Kicinski }
700d9ae7f2bSJakub Kicinski 
7019879a381SJiong Wang /* wrp_reg_subpart() - load @field_len bytes from @offset of @src, write the
7029879a381SJiong Wang  * result to @dst from low end.
7039879a381SJiong Wang  */
7049879a381SJiong Wang static void
7059879a381SJiong Wang wrp_reg_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src, u8 field_len,
7069879a381SJiong Wang 		u8 offset)
7079879a381SJiong Wang {
7089879a381SJiong Wang 	enum shf_sc sc = offset ? SHF_SC_R_SHF : SHF_SC_NONE;
7099879a381SJiong Wang 	u8 mask = (1 << field_len) - 1;
7109879a381SJiong Wang 
7119879a381SJiong Wang 	emit_ld_field_any(nfp_prog, dst, mask, src, sc, offset * 8, true);
7129879a381SJiong Wang }
7139879a381SJiong Wang 
71491ff69e8SJiong Wang /* wrp_reg_or_subpart() - load @field_len bytes from low end of @src, or the
71591ff69e8SJiong Wang  * result to @dst from offset, there is no change on the other bits of @dst.
71691ff69e8SJiong Wang  */
71791ff69e8SJiong Wang static void
71891ff69e8SJiong Wang wrp_reg_or_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src,
71991ff69e8SJiong Wang 		   u8 field_len, u8 offset)
72091ff69e8SJiong Wang {
72191ff69e8SJiong Wang 	enum shf_sc sc = offset ? SHF_SC_L_SHF : SHF_SC_NONE;
72291ff69e8SJiong Wang 	u8 mask = ((1 << field_len) - 1) << offset;
72391ff69e8SJiong Wang 
72491ff69e8SJiong Wang 	emit_ld_field(nfp_prog, dst, mask, src, sc, 32 - offset * 8);
72591ff69e8SJiong Wang }
72691ff69e8SJiong Wang 
7273dd43c33SJakub Kicinski static void
7283dd43c33SJakub Kicinski addr40_offset(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
7293dd43c33SJakub Kicinski 	      swreg *rega, swreg *regb)
7303dd43c33SJakub Kicinski {
7313dd43c33SJakub Kicinski 	if (offset == reg_imm(0)) {
7323dd43c33SJakub Kicinski 		*rega = reg_a(src_gpr);
7333dd43c33SJakub Kicinski 		*regb = reg_b(src_gpr + 1);
7343dd43c33SJakub Kicinski 		return;
7353dd43c33SJakub Kicinski 	}
7363dd43c33SJakub Kicinski 
7373dd43c33SJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(src_gpr), ALU_OP_ADD, offset);
7383dd43c33SJakub Kicinski 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_b(src_gpr + 1), ALU_OP_ADD_C,
7393dd43c33SJakub Kicinski 		 reg_imm(0));
7403dd43c33SJakub Kicinski 	*rega = imm_a(nfp_prog);
7413dd43c33SJakub Kicinski 	*regb = imm_b(nfp_prog);
7423dd43c33SJakub Kicinski }
7433dd43c33SJakub Kicinski 
7449879a381SJiong Wang /* NFP has Command Push Pull bus which supports bluk memory operations. */
7459879a381SJiong Wang static int nfp_cpp_memcpy(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
7469879a381SJiong Wang {
7479879a381SJiong Wang 	bool descending_seq = meta->ldst_gather_len < 0;
7489879a381SJiong Wang 	s16 len = abs(meta->ldst_gather_len);
7499879a381SJiong Wang 	swreg src_base, off;
7503dd43c33SJakub Kicinski 	bool src_40bit_addr;
7519879a381SJiong Wang 	unsigned int i;
7529879a381SJiong Wang 	u8 xfer_num;
7539879a381SJiong Wang 
7549879a381SJiong Wang 	off = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
7553dd43c33SJakub Kicinski 	src_40bit_addr = meta->ptr.type == PTR_TO_MAP_VALUE;
7569879a381SJiong Wang 	src_base = reg_a(meta->insn.src_reg * 2);
7579879a381SJiong Wang 	xfer_num = round_up(len, 4) / 4;
7589879a381SJiong Wang 
7593dd43c33SJakub Kicinski 	if (src_40bit_addr)
760cc0dff6dSJiong Wang 		addr40_offset(nfp_prog, meta->insn.src_reg * 2, off, &src_base,
7613dd43c33SJakub Kicinski 			      &off);
7623dd43c33SJakub Kicinski 
7638c900538SJiong Wang 	/* Setup PREV_ALU fields to override memory read length. */
7648c900538SJiong Wang 	if (len > 32)
7658c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7668c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
7678c900538SJiong Wang 
7689879a381SJiong Wang 	/* Memory read from source addr into transfer-in registers. */
7693dd43c33SJakub Kicinski 	emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP,
7703dd43c33SJakub Kicinski 		     src_40bit_addr ? CMD_MODE_40b_BA : CMD_MODE_32b, 0,
771b556ddd9SJakub Kicinski 		     src_base, off, xfer_num - 1, CMD_CTX_SWAP, len > 32);
7729879a381SJiong Wang 
7739879a381SJiong Wang 	/* Move from transfer-in to transfer-out. */
7749879a381SJiong Wang 	for (i = 0; i < xfer_num; i++)
7759879a381SJiong Wang 		wrp_mov(nfp_prog, reg_xfer(i), reg_xfer(i));
7769879a381SJiong Wang 
7779879a381SJiong Wang 	off = re_load_imm_any(nfp_prog, meta->paired_st->off, imm_b(nfp_prog));
7789879a381SJiong Wang 
7799879a381SJiong Wang 	if (len <= 8) {
7809879a381SJiong Wang 		/* Use single direct_ref write8. */
7819879a381SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
7829879a381SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, len - 1,
783b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
7848c900538SJiong Wang 	} else if (len <= 32 && IS_ALIGNED(len, 4)) {
7859879a381SJiong Wang 		/* Use single direct_ref write32. */
7869879a381SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
7879879a381SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, xfer_num - 1,
788b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
7898c900538SJiong Wang 	} else if (len <= 32) {
7909879a381SJiong Wang 		/* Use single indirect_ref write8. */
7919879a381SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7929879a381SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, len - 1));
7939879a381SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
7949879a381SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
795b556ddd9SJakub Kicinski 			       len - 1, CMD_CTX_SWAP);
7968c900538SJiong Wang 	} else if (IS_ALIGNED(len, 4)) {
7978c900538SJiong Wang 		/* Use single indirect_ref write32. */
7988c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7998c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
8008c900538SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8018c900538SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
802b556ddd9SJakub Kicinski 			       xfer_num - 1, CMD_CTX_SWAP);
8038c900538SJiong Wang 	} else if (len <= 40) {
8048c900538SJiong Wang 		/* Use one direct_ref write32 to write the first 32-bytes, then
8058c900538SJiong Wang 		 * another direct_ref write8 to write the remaining bytes.
8068c900538SJiong Wang 		 */
8078c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8088c900538SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, 7,
809b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
8108c900538SJiong Wang 
8118c900538SJiong Wang 		off = re_load_imm_any(nfp_prog, meta->paired_st->off + 32,
8128c900538SJiong Wang 				      imm_b(nfp_prog));
8138c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 8,
8148c900538SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, len - 33,
815b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
8168c900538SJiong Wang 	} else {
8178c900538SJiong Wang 		/* Use one indirect_ref write32 to write 4-bytes aligned length,
8188c900538SJiong Wang 		 * then another direct_ref write8 to write the remaining bytes.
8198c900538SJiong Wang 		 */
8208c900538SJiong Wang 		u8 new_off;
8218c900538SJiong Wang 
8228c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
8238c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 2));
8248c900538SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8258c900538SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
826b556ddd9SJakub Kicinski 			       xfer_num - 2, CMD_CTX_SWAP);
8278c900538SJiong Wang 		new_off = meta->paired_st->off + (xfer_num - 1) * 4;
8288c900538SJiong Wang 		off = re_load_imm_any(nfp_prog, new_off, imm_b(nfp_prog));
8298c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b,
8308c900538SJiong Wang 			 xfer_num - 1, reg_a(meta->paired_st->dst_reg * 2), off,
831b556ddd9SJakub Kicinski 			 (len & 0x3) - 1, CMD_CTX_SWAP);
8329879a381SJiong Wang 	}
8339879a381SJiong Wang 
8349879a381SJiong Wang 	/* TODO: The following extra load is to make sure data flow be identical
8359879a381SJiong Wang 	 *  before and after we do memory copy optimization.
8369879a381SJiong Wang 	 *
8379879a381SJiong Wang 	 *  The load destination register is not guaranteed to be dead, so we
8389879a381SJiong Wang 	 *  need to make sure it is loaded with the value the same as before
8399879a381SJiong Wang 	 *  this transformation.
8409879a381SJiong Wang 	 *
8419879a381SJiong Wang 	 *  These extra loads could be removed once we have accurate register
8429879a381SJiong Wang 	 *  usage information.
8439879a381SJiong Wang 	 */
8449879a381SJiong Wang 	if (descending_seq)
8459879a381SJiong Wang 		xfer_num = 0;
8469879a381SJiong Wang 	else if (BPF_SIZE(meta->insn.code) != BPF_DW)
8479879a381SJiong Wang 		xfer_num = xfer_num - 1;
8489879a381SJiong Wang 	else
8499879a381SJiong Wang 		xfer_num = xfer_num - 2;
8509879a381SJiong Wang 
8519879a381SJiong Wang 	switch (BPF_SIZE(meta->insn.code)) {
8529879a381SJiong Wang 	case BPF_B:
8539879a381SJiong Wang 		wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8549879a381SJiong Wang 				reg_xfer(xfer_num), 1,
8559879a381SJiong Wang 				IS_ALIGNED(len, 4) ? 3 : (len & 3) - 1);
8569879a381SJiong Wang 		break;
8579879a381SJiong Wang 	case BPF_H:
8589879a381SJiong Wang 		wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8599879a381SJiong Wang 				reg_xfer(xfer_num), 2, (len & 3) ^ 2);
8609879a381SJiong Wang 		break;
8619879a381SJiong Wang 	case BPF_W:
8629879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8639879a381SJiong Wang 			reg_xfer(0));
8649879a381SJiong Wang 		break;
8659879a381SJiong Wang 	case BPF_DW:
8669879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8679879a381SJiong Wang 			reg_xfer(xfer_num));
8689879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1),
8699879a381SJiong Wang 			reg_xfer(xfer_num + 1));
8709879a381SJiong Wang 		break;
8719879a381SJiong Wang 	}
8729879a381SJiong Wang 
8739879a381SJiong Wang 	if (BPF_SIZE(meta->insn.code) != BPF_DW)
8749879a381SJiong Wang 		wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
8759879a381SJiong Wang 
8769879a381SJiong Wang 	return 0;
8779879a381SJiong Wang }
8789879a381SJiong Wang 
879d9ae7f2bSJakub Kicinski static int
8800a793977SJakub Kicinski data_ld(struct nfp_prog *nfp_prog, swreg offset, u8 dst_gpr, int size)
881d9ae7f2bSJakub Kicinski {
882d9ae7f2bSJakub Kicinski 	unsigned int i;
883d9ae7f2bSJakub Kicinski 	u16 shift, sz;
884d9ae7f2bSJakub Kicinski 
885d9ae7f2bSJakub Kicinski 	/* We load the value from the address indicated in @offset and then
886d9ae7f2bSJakub Kicinski 	 * shift out the data we don't need.  Note: this is big endian!
887d9ae7f2bSJakub Kicinski 	 */
8880a793977SJakub Kicinski 	sz = max(size, 4);
889d9ae7f2bSJakub Kicinski 	shift = size < 4 ? 4 - size : 0;
890d9ae7f2bSJakub Kicinski 
8910a793977SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
892b556ddd9SJakub Kicinski 		 pptr_reg(nfp_prog), offset, sz - 1, CMD_CTX_SWAP);
8930a793977SJakub Kicinski 
8940a793977SJakub Kicinski 	i = 0;
8950a793977SJakub Kicinski 	if (shift)
8960a793977SJakub Kicinski 		emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE,
8970a793977SJakub Kicinski 			 reg_xfer(0), SHF_SC_R_SHF, shift * 8);
8980a793977SJakub Kicinski 	else
8990a793977SJakub Kicinski 		for (; i * 4 < size; i++)
9000a793977SJakub Kicinski 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
9010a793977SJakub Kicinski 
9020a793977SJakub Kicinski 	if (i < 2)
9030a793977SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
9040a793977SJakub Kicinski 
9050a793977SJakub Kicinski 	return 0;
9060a793977SJakub Kicinski }
9070a793977SJakub Kicinski 
9080a793977SJakub Kicinski static int
9093dd43c33SJakub Kicinski data_ld_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr,
9103dd43c33SJakub Kicinski 		   swreg lreg, swreg rreg, int size, enum cmd_mode mode)
9112ca71441SJakub Kicinski {
9122ca71441SJakub Kicinski 	unsigned int i;
9132ca71441SJakub Kicinski 	u8 mask, sz;
9142ca71441SJakub Kicinski 
9153dd43c33SJakub Kicinski 	/* We load the value from the address indicated in rreg + lreg and then
9162ca71441SJakub Kicinski 	 * mask out the data we don't need.  Note: this is little endian!
9172ca71441SJakub Kicinski 	 */
9182ca71441SJakub Kicinski 	sz = max(size, 4);
9192ca71441SJakub Kicinski 	mask = size < 4 ? GENMASK(size - 1, 0) : 0;
9202ca71441SJakub Kicinski 
9213dd43c33SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, mode, 0,
922b556ddd9SJakub Kicinski 		 lreg, rreg, sz / 4 - 1, CMD_CTX_SWAP);
9232ca71441SJakub Kicinski 
9242ca71441SJakub Kicinski 	i = 0;
9252ca71441SJakub Kicinski 	if (mask)
9262ca71441SJakub Kicinski 		emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask,
9272ca71441SJakub Kicinski 				  reg_xfer(0), SHF_SC_NONE, 0, true);
9282ca71441SJakub Kicinski 	else
9292ca71441SJakub Kicinski 		for (; i * 4 < size; i++)
9302ca71441SJakub Kicinski 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
9312ca71441SJakub Kicinski 
9322ca71441SJakub Kicinski 	if (i < 2)
9332ca71441SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
9342ca71441SJakub Kicinski 
9352ca71441SJakub Kicinski 	return 0;
9362ca71441SJakub Kicinski }
9372ca71441SJakub Kicinski 
9382ca71441SJakub Kicinski static int
9393dd43c33SJakub Kicinski data_ld_host_order_addr32(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
9403dd43c33SJakub Kicinski 			  u8 dst_gpr, u8 size)
9413dd43c33SJakub Kicinski {
9423dd43c33SJakub Kicinski 	return data_ld_host_order(nfp_prog, dst_gpr, reg_a(src_gpr), offset,
9433dd43c33SJakub Kicinski 				  size, CMD_MODE_32b);
9443dd43c33SJakub Kicinski }
9453dd43c33SJakub Kicinski 
9463dd43c33SJakub Kicinski static int
9473dd43c33SJakub Kicinski data_ld_host_order_addr40(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
9483dd43c33SJakub Kicinski 			  u8 dst_gpr, u8 size)
9493dd43c33SJakub Kicinski {
9503dd43c33SJakub Kicinski 	swreg rega, regb;
9513dd43c33SJakub Kicinski 
9523dd43c33SJakub Kicinski 	addr40_offset(nfp_prog, src_gpr, offset, &rega, &regb);
9533dd43c33SJakub Kicinski 
9543dd43c33SJakub Kicinski 	return data_ld_host_order(nfp_prog, dst_gpr, rega, regb,
9553dd43c33SJakub Kicinski 				  size, CMD_MODE_40b_BA);
9563dd43c33SJakub Kicinski }
9573dd43c33SJakub Kicinski 
9583dd43c33SJakub Kicinski static int
9590a793977SJakub Kicinski construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, u16 src, u8 size)
9600a793977SJakub Kicinski {
9610a793977SJakub Kicinski 	swreg tmp_reg;
9620a793977SJakub Kicinski 
963d9ae7f2bSJakub Kicinski 	/* Calculate the true offset (src_reg + imm) */
964d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
9650a793977SJakub Kicinski 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg);
9660a793977SJakub Kicinski 
967d9ae7f2bSJakub Kicinski 	/* Check packet length (size guaranteed to fit b/c it's u8) */
968d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog),
969d9ae7f2bSJakub Kicinski 		 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
970d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
97118e53b6cSJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog));
972e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
9730a793977SJakub Kicinski 
974d9ae7f2bSJakub Kicinski 	/* Load data */
9750a793977SJakub Kicinski 	return data_ld(nfp_prog, imm_b(nfp_prog), 0, size);
976d9ae7f2bSJakub Kicinski }
977d9ae7f2bSJakub Kicinski 
978d9ae7f2bSJakub Kicinski static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size)
979d9ae7f2bSJakub Kicinski {
9800a793977SJakub Kicinski 	swreg tmp_reg;
9810a793977SJakub Kicinski 
9820a793977SJakub Kicinski 	/* Check packet length */
9830a793977SJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog));
9840a793977SJakub Kicinski 	emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
985e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
9860a793977SJakub Kicinski 
9870a793977SJakub Kicinski 	/* Load data */
9880a793977SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
9890a793977SJakub Kicinski 	return data_ld(nfp_prog, tmp_reg, 0, size);
990d9ae7f2bSJakub Kicinski }
991d9ae7f2bSJakub Kicinski 
992e663fe38SJakub Kicinski static int
993e663fe38SJakub Kicinski data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
994e663fe38SJakub Kicinski 		    u8 src_gpr, u8 size)
995e663fe38SJakub Kicinski {
996e663fe38SJakub Kicinski 	unsigned int i;
997e663fe38SJakub Kicinski 
998e663fe38SJakub Kicinski 	for (i = 0; i * 4 < size; i++)
999e663fe38SJakub Kicinski 		wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i));
1000e663fe38SJakub Kicinski 
1001e663fe38SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
1002b556ddd9SJakub Kicinski 		 reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
1003e663fe38SJakub Kicinski 
1004e663fe38SJakub Kicinski 	return 0;
1005e663fe38SJakub Kicinski }
1006e663fe38SJakub Kicinski 
1007e663fe38SJakub Kicinski static int
1008e663fe38SJakub Kicinski data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
1009e663fe38SJakub Kicinski 		   u64 imm, u8 size)
1010e663fe38SJakub Kicinski {
1011e663fe38SJakub Kicinski 	wrp_immed(nfp_prog, reg_xfer(0), imm);
1012e663fe38SJakub Kicinski 	if (size == 8)
1013e663fe38SJakub Kicinski 		wrp_immed(nfp_prog, reg_xfer(1), imm >> 32);
1014e663fe38SJakub Kicinski 
1015e663fe38SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
1016b556ddd9SJakub Kicinski 		 reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
1017e663fe38SJakub Kicinski 
1018e663fe38SJakub Kicinski 	return 0;
1019e663fe38SJakub Kicinski }
1020e663fe38SJakub Kicinski 
1021ee9133a8SJakub Kicinski typedef int
1022ee9133a8SJakub Kicinski (*lmem_step)(struct nfp_prog *nfp_prog, u8 gpr, u8 gpr_byte, s32 off,
10232df03a50SJakub Kicinski 	     unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10242df03a50SJakub Kicinski 	     bool needs_inc);
1025a82b23fbSJakub Kicinski 
1026a82b23fbSJakub Kicinski static int
1027a82b23fbSJakub Kicinski wrp_lmem_load(struct nfp_prog *nfp_prog, u8 dst, u8 dst_byte, s32 off,
10282df03a50SJakub Kicinski 	      unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10292df03a50SJakub Kicinski 	      bool needs_inc)
1030a82b23fbSJakub Kicinski {
10312df03a50SJakub Kicinski 	bool should_inc = needs_inc && new_gpr && !last;
1032a82b23fbSJakub Kicinski 	u32 idx, src_byte;
1033a82b23fbSJakub Kicinski 	enum shf_sc sc;
1034a82b23fbSJakub Kicinski 	swreg reg;
1035a82b23fbSJakub Kicinski 	int shf;
1036a82b23fbSJakub Kicinski 	u8 mask;
1037a82b23fbSJakub Kicinski 
1038a82b23fbSJakub Kicinski 	if (WARN_ON_ONCE(dst_byte + size > 4 || off % 4 + size > 4))
1039a82b23fbSJakub Kicinski 		return -EOPNOTSUPP;
1040a82b23fbSJakub Kicinski 
1041a82b23fbSJakub Kicinski 	idx = off / 4;
1042a82b23fbSJakub Kicinski 
1043a82b23fbSJakub Kicinski 	/* Move the entire word */
1044a82b23fbSJakub Kicinski 	if (size == 4) {
10452df03a50SJakub Kicinski 		wrp_mov(nfp_prog, reg_both(dst),
10462df03a50SJakub Kicinski 			should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx));
1047a82b23fbSJakub Kicinski 		return 0;
1048a82b23fbSJakub Kicinski 	}
1049a82b23fbSJakub Kicinski 
10502df03a50SJakub Kicinski 	if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
10512df03a50SJakub Kicinski 		return -EOPNOTSUPP;
10522df03a50SJakub Kicinski 
1053a82b23fbSJakub Kicinski 	src_byte = off % 4;
1054a82b23fbSJakub Kicinski 
1055a82b23fbSJakub Kicinski 	mask = (1 << size) - 1;
1056a82b23fbSJakub Kicinski 	mask <<= dst_byte;
1057a82b23fbSJakub Kicinski 
1058a82b23fbSJakub Kicinski 	if (WARN_ON_ONCE(mask > 0xf))
1059a82b23fbSJakub Kicinski 		return -EOPNOTSUPP;
1060a82b23fbSJakub Kicinski 
1061a82b23fbSJakub Kicinski 	shf = abs(src_byte - dst_byte) * 8;
1062a82b23fbSJakub Kicinski 	if (src_byte == dst_byte) {
1063a82b23fbSJakub Kicinski 		sc = SHF_SC_NONE;
1064a82b23fbSJakub Kicinski 	} else if (src_byte < dst_byte) {
1065a82b23fbSJakub Kicinski 		shf = 32 - shf;
1066a82b23fbSJakub Kicinski 		sc = SHF_SC_L_SHF;
1067a82b23fbSJakub Kicinski 	} else {
1068a82b23fbSJakub Kicinski 		sc = SHF_SC_R_SHF;
1069a82b23fbSJakub Kicinski 	}
1070a82b23fbSJakub Kicinski 
1071a82b23fbSJakub Kicinski 	/* ld_field can address fewer indexes, if offset too large do RMW.
1072a82b23fbSJakub Kicinski 	 * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
1073a82b23fbSJakub Kicinski 	 */
1074a82b23fbSJakub Kicinski 	if (idx <= RE_REG_LM_IDX_MAX) {
10752df03a50SJakub Kicinski 		reg = reg_lm(lm3 ? 3 : 0, idx);
1076a82b23fbSJakub Kicinski 	} else {
1077a82b23fbSJakub Kicinski 		reg = imm_a(nfp_prog);
10789a90c83cSJakub Kicinski 		/* If it's not the first part of the load and we start a new GPR
10799a90c83cSJakub Kicinski 		 * that means we are loading a second part of the LMEM word into
10809a90c83cSJakub Kicinski 		 * a new GPR.  IOW we've already looked that LMEM word and
10819a90c83cSJakub Kicinski 		 * therefore it has been loaded into imm_a().
10829a90c83cSJakub Kicinski 		 */
10839a90c83cSJakub Kicinski 		if (first || !new_gpr)
1084a82b23fbSJakub Kicinski 			wrp_mov(nfp_prog, reg, reg_lm(0, idx));
1085a82b23fbSJakub Kicinski 	}
1086a82b23fbSJakub Kicinski 
1087a82b23fbSJakub Kicinski 	emit_ld_field_any(nfp_prog, reg_both(dst), mask, reg, sc, shf, new_gpr);
1088a82b23fbSJakub Kicinski 
10892df03a50SJakub Kicinski 	if (should_inc)
10902df03a50SJakub Kicinski 		wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
10912df03a50SJakub Kicinski 
1092a82b23fbSJakub Kicinski 	return 0;
1093a82b23fbSJakub Kicinski }
1094ee9133a8SJakub Kicinski 
1095ee9133a8SJakub Kicinski static int
1096ee9133a8SJakub Kicinski wrp_lmem_store(struct nfp_prog *nfp_prog, u8 src, u8 src_byte, s32 off,
10972df03a50SJakub Kicinski 	       unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10982df03a50SJakub Kicinski 	       bool needs_inc)
1099ee9133a8SJakub Kicinski {
11002df03a50SJakub Kicinski 	bool should_inc = needs_inc && new_gpr && !last;
1101ee9133a8SJakub Kicinski 	u32 idx, dst_byte;
1102ee9133a8SJakub Kicinski 	enum shf_sc sc;
1103ee9133a8SJakub Kicinski 	swreg reg;
1104ee9133a8SJakub Kicinski 	int shf;
1105ee9133a8SJakub Kicinski 	u8 mask;
1106ee9133a8SJakub Kicinski 
1107ee9133a8SJakub Kicinski 	if (WARN_ON_ONCE(src_byte + size > 4 || off % 4 + size > 4))
1108ee9133a8SJakub Kicinski 		return -EOPNOTSUPP;
1109ee9133a8SJakub Kicinski 
1110ee9133a8SJakub Kicinski 	idx = off / 4;
1111ee9133a8SJakub Kicinski 
1112ee9133a8SJakub Kicinski 	/* Move the entire word */
1113ee9133a8SJakub Kicinski 	if (size == 4) {
11142df03a50SJakub Kicinski 		wrp_mov(nfp_prog,
11152df03a50SJakub Kicinski 			should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx),
11162df03a50SJakub Kicinski 			reg_b(src));
1117ee9133a8SJakub Kicinski 		return 0;
1118ee9133a8SJakub Kicinski 	}
1119ee9133a8SJakub Kicinski 
11202df03a50SJakub Kicinski 	if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
11212df03a50SJakub Kicinski 		return -EOPNOTSUPP;
11222df03a50SJakub Kicinski 
1123ee9133a8SJakub Kicinski 	dst_byte = off % 4;
1124ee9133a8SJakub Kicinski 
1125ee9133a8SJakub Kicinski 	mask = (1 << size) - 1;
1126ee9133a8SJakub Kicinski 	mask <<= dst_byte;
1127ee9133a8SJakub Kicinski 
1128ee9133a8SJakub Kicinski 	if (WARN_ON_ONCE(mask > 0xf))
1129ee9133a8SJakub Kicinski 		return -EOPNOTSUPP;
1130ee9133a8SJakub Kicinski 
1131ee9133a8SJakub Kicinski 	shf = abs(src_byte - dst_byte) * 8;
1132ee9133a8SJakub Kicinski 	if (src_byte == dst_byte) {
1133ee9133a8SJakub Kicinski 		sc = SHF_SC_NONE;
1134ee9133a8SJakub Kicinski 	} else if (src_byte < dst_byte) {
1135ee9133a8SJakub Kicinski 		shf = 32 - shf;
1136ee9133a8SJakub Kicinski 		sc = SHF_SC_L_SHF;
1137ee9133a8SJakub Kicinski 	} else {
1138ee9133a8SJakub Kicinski 		sc = SHF_SC_R_SHF;
1139ee9133a8SJakub Kicinski 	}
1140ee9133a8SJakub Kicinski 
1141ee9133a8SJakub Kicinski 	/* ld_field can address fewer indexes, if offset too large do RMW.
1142ee9133a8SJakub Kicinski 	 * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
1143ee9133a8SJakub Kicinski 	 */
1144ee9133a8SJakub Kicinski 	if (idx <= RE_REG_LM_IDX_MAX) {
11452df03a50SJakub Kicinski 		reg = reg_lm(lm3 ? 3 : 0, idx);
1146ee9133a8SJakub Kicinski 	} else {
1147ee9133a8SJakub Kicinski 		reg = imm_a(nfp_prog);
11489a90c83cSJakub Kicinski 		/* Only first and last LMEM locations are going to need RMW,
11499a90c83cSJakub Kicinski 		 * the middle location will be overwritten fully.
11509a90c83cSJakub Kicinski 		 */
11519a90c83cSJakub Kicinski 		if (first || last)
1152ee9133a8SJakub Kicinski 			wrp_mov(nfp_prog, reg, reg_lm(0, idx));
1153ee9133a8SJakub Kicinski 	}
1154ee9133a8SJakub Kicinski 
1155ee9133a8SJakub Kicinski 	emit_ld_field(nfp_prog, reg, mask, reg_b(src), sc, shf);
1156ee9133a8SJakub Kicinski 
11579a90c83cSJakub Kicinski 	if (new_gpr || last) {
1158ee9133a8SJakub Kicinski 		if (idx > RE_REG_LM_IDX_MAX)
1159ee9133a8SJakub Kicinski 			wrp_mov(nfp_prog, reg_lm(0, idx), reg);
11602df03a50SJakub Kicinski 		if (should_inc)
11612df03a50SJakub Kicinski 			wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
11629a90c83cSJakub Kicinski 	}
1163ee9133a8SJakub Kicinski 
1164ee9133a8SJakub Kicinski 	return 0;
1165ee9133a8SJakub Kicinski }
1166ee9133a8SJakub Kicinski 
1167ee9133a8SJakub Kicinski static int
1168ee9133a8SJakub Kicinski mem_op_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1169b14157eeSJakub Kicinski 	     unsigned int size, unsigned int ptr_off, u8 gpr, u8 ptr_gpr,
1170b14157eeSJakub Kicinski 	     bool clr_gpr, lmem_step step)
1171ee9133a8SJakub Kicinski {
11721a7e62e6SQuentin Monnet 	s32 off = nfp_prog->stack_frame_depth + meta->insn.off + ptr_off;
11739a90c83cSJakub Kicinski 	bool first = true, last;
11742df03a50SJakub Kicinski 	bool needs_inc = false;
11752df03a50SJakub Kicinski 	swreg stack_off_reg;
1176a82b23fbSJakub Kicinski 	u8 prev_gpr = 255;
1177ee9133a8SJakub Kicinski 	u32 gpr_byte = 0;
11782df03a50SJakub Kicinski 	bool lm3 = true;
1179ee9133a8SJakub Kicinski 	int ret;
1180ee9133a8SJakub Kicinski 
11817ff0ccdeSQuentin Monnet 	if (meta->ptr_not_const ||
11827ff0ccdeSQuentin Monnet 	    meta->flags & FLAG_INSN_PTR_CALLER_STACK_FRAME) {
1183b14157eeSJakub Kicinski 		/* Use of the last encountered ptr_off is OK, they all have
1184b14157eeSJakub Kicinski 		 * the same alignment.  Depend on low bits of value being
1185b14157eeSJakub Kicinski 		 * discarded when written to LMaddr register.
1186b14157eeSJakub Kicinski 		 */
1187b14157eeSJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, meta->insn.off,
1188b14157eeSJakub Kicinski 						stack_imm(nfp_prog));
1189b14157eeSJakub Kicinski 
1190b14157eeSJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
1191b14157eeSJakub Kicinski 			 reg_a(ptr_gpr), ALU_OP_ADD, stack_off_reg);
1192b14157eeSJakub Kicinski 
1193b14157eeSJakub Kicinski 		needs_inc = true;
1194b14157eeSJakub Kicinski 	} else if (off + size <= 64) {
11952df03a50SJakub Kicinski 		/* We can reach bottom 64B with LMaddr0 */
11962df03a50SJakub Kicinski 		lm3 = false;
11972df03a50SJakub Kicinski 	} else if (round_down(off, 32) == round_down(off + size - 1, 32)) {
11982df03a50SJakub Kicinski 		/* We have to set up a new pointer.  If we know the offset
11992df03a50SJakub Kicinski 		 * and the entire access falls into a single 32 byte aligned
12002df03a50SJakub Kicinski 		 * window we won't have to increment the LM pointer.
12012df03a50SJakub Kicinski 		 * The 32 byte alignment is imporant because offset is ORed in
12022df03a50SJakub Kicinski 		 * not added when doing *l$indexN[off].
12032df03a50SJakub Kicinski 		 */
12042df03a50SJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 32),
12052df03a50SJakub Kicinski 						stack_imm(nfp_prog));
12062df03a50SJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
12072df03a50SJakub Kicinski 			 stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
12082df03a50SJakub Kicinski 
12092df03a50SJakub Kicinski 		off %= 32;
12102df03a50SJakub Kicinski 	} else {
12112df03a50SJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 4),
12122df03a50SJakub Kicinski 						stack_imm(nfp_prog));
12132df03a50SJakub Kicinski 
12142df03a50SJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
12152df03a50SJakub Kicinski 			 stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
12162df03a50SJakub Kicinski 
12172df03a50SJakub Kicinski 		needs_inc = true;
12182df03a50SJakub Kicinski 	}
12192df03a50SJakub Kicinski 	if (lm3) {
12202df03a50SJakub Kicinski 		emit_csr_wr(nfp_prog, imm_b(nfp_prog), NFP_CSR_ACT_LM_ADDR3);
12212df03a50SJakub Kicinski 		/* For size < 4 one slot will be filled by zeroing of upper. */
12222df03a50SJakub Kicinski 		wrp_nops(nfp_prog, clr_gpr && size < 8 ? 2 : 3);
12232df03a50SJakub Kicinski 	}
12242df03a50SJakub Kicinski 
1225a82b23fbSJakub Kicinski 	if (clr_gpr && size < 8)
1226a82b23fbSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
1227a82b23fbSJakub Kicinski 
1228ee9133a8SJakub Kicinski 	while (size) {
1229ee9133a8SJakub Kicinski 		u32 slice_end;
1230ee9133a8SJakub Kicinski 		u8 slice_size;
1231ee9133a8SJakub Kicinski 
1232ee9133a8SJakub Kicinski 		slice_size = min(size, 4 - gpr_byte);
1233ee9133a8SJakub Kicinski 		slice_end = min(off + slice_size, round_up(off + 1, 4));
1234ee9133a8SJakub Kicinski 		slice_size = slice_end - off;
1235ee9133a8SJakub Kicinski 
12369a90c83cSJakub Kicinski 		last = slice_size == size;
12379a90c83cSJakub Kicinski 
12382df03a50SJakub Kicinski 		if (needs_inc)
12392df03a50SJakub Kicinski 			off %= 4;
12402df03a50SJakub Kicinski 
1241a82b23fbSJakub Kicinski 		ret = step(nfp_prog, gpr, gpr_byte, off, slice_size,
12422df03a50SJakub Kicinski 			   first, gpr != prev_gpr, last, lm3, needs_inc);
1243ee9133a8SJakub Kicinski 		if (ret)
1244ee9133a8SJakub Kicinski 			return ret;
1245ee9133a8SJakub Kicinski 
1246a82b23fbSJakub Kicinski 		prev_gpr = gpr;
12479a90c83cSJakub Kicinski 		first = false;
12489a90c83cSJakub Kicinski 
1249ee9133a8SJakub Kicinski 		gpr_byte += slice_size;
1250ee9133a8SJakub Kicinski 		if (gpr_byte >= 4) {
1251ee9133a8SJakub Kicinski 			gpr_byte -= 4;
1252ee9133a8SJakub Kicinski 			gpr++;
1253ee9133a8SJakub Kicinski 		}
1254ee9133a8SJakub Kicinski 
1255ee9133a8SJakub Kicinski 		size -= slice_size;
1256ee9133a8SJakub Kicinski 		off += slice_size;
1257ee9133a8SJakub Kicinski 	}
1258ee9133a8SJakub Kicinski 
1259ee9133a8SJakub Kicinski 	return 0;
1260ee9133a8SJakub Kicinski }
1261ee9133a8SJakub Kicinski 
1262d9ae7f2bSJakub Kicinski static void
1263d9ae7f2bSJakub Kicinski wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
1264d9ae7f2bSJakub Kicinski {
1265b3f868dfSJakub Kicinski 	swreg tmp_reg;
1266d9ae7f2bSJakub Kicinski 
1267d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_AND) {
1268d9ae7f2bSJakub Kicinski 		if (!imm)
1269d9ae7f2bSJakub Kicinski 			wrp_immed(nfp_prog, reg_both(dst), 0);
1270d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1271d9ae7f2bSJakub Kicinski 			return;
1272d9ae7f2bSJakub Kicinski 	}
1273d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_OR) {
1274d9ae7f2bSJakub Kicinski 		if (!~imm)
1275d9ae7f2bSJakub Kicinski 			wrp_immed(nfp_prog, reg_both(dst), ~0U);
1276d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1277d9ae7f2bSJakub Kicinski 			return;
1278d9ae7f2bSJakub Kicinski 	}
1279d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_XOR) {
1280d9ae7f2bSJakub Kicinski 		if (!~imm)
1281d9ae7f2bSJakub Kicinski 			emit_alu(nfp_prog, reg_both(dst), reg_none(),
12825d42ced1SJiong Wang 				 ALU_OP_NOT, reg_b(dst));
1283d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1284d9ae7f2bSJakub Kicinski 			return;
1285d9ae7f2bSJakub Kicinski 	}
1286d9ae7f2bSJakub Kicinski 
1287d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
1288d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
1289d9ae7f2bSJakub Kicinski }
1290d9ae7f2bSJakub Kicinski 
1291d9ae7f2bSJakub Kicinski static int
1292d9ae7f2bSJakub Kicinski wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1293d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op, bool skip)
1294d9ae7f2bSJakub Kicinski {
1295d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1296d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1297d9ae7f2bSJakub Kicinski 
1298d9ae7f2bSJakub Kicinski 	if (skip) {
1299d9ae7f2bSJakub Kicinski 		meta->skip = true;
1300d9ae7f2bSJakub Kicinski 		return 0;
1301d9ae7f2bSJakub Kicinski 	}
1302d9ae7f2bSJakub Kicinski 
1303d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
1304d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
1305d9ae7f2bSJakub Kicinski 
1306d9ae7f2bSJakub Kicinski 	return 0;
1307d9ae7f2bSJakub Kicinski }
1308d9ae7f2bSJakub Kicinski 
1309d9ae7f2bSJakub Kicinski static int
1310d9ae7f2bSJakub Kicinski wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1311d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op)
1312d9ae7f2bSJakub Kicinski {
1313d9ae7f2bSJakub Kicinski 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
1314d9ae7f2bSJakub Kicinski 
1315d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
1316d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst + 1),
1317d9ae7f2bSJakub Kicinski 		 reg_a(dst + 1), alu_op, reg_b(src + 1));
1318d9ae7f2bSJakub Kicinski 
1319d9ae7f2bSJakub Kicinski 	return 0;
1320d9ae7f2bSJakub Kicinski }
1321d9ae7f2bSJakub Kicinski 
1322d9ae7f2bSJakub Kicinski static int
1323d9ae7f2bSJakub Kicinski wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1324d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op, bool skip)
1325d9ae7f2bSJakub Kicinski {
1326d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1327d9ae7f2bSJakub Kicinski 
1328d9ae7f2bSJakub Kicinski 	if (skip) {
1329d9ae7f2bSJakub Kicinski 		meta->skip = true;
1330d9ae7f2bSJakub Kicinski 		return 0;
1331d9ae7f2bSJakub Kicinski 	}
1332d9ae7f2bSJakub Kicinski 
1333d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm);
1334d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
1335d9ae7f2bSJakub Kicinski 
1336d9ae7f2bSJakub Kicinski 	return 0;
1337d9ae7f2bSJakub Kicinski }
1338d9ae7f2bSJakub Kicinski 
1339d9ae7f2bSJakub Kicinski static int
1340d9ae7f2bSJakub Kicinski wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1341d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op)
1342d9ae7f2bSJakub Kicinski {
1343d9ae7f2bSJakub Kicinski 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
1344d9ae7f2bSJakub Kicinski 
1345d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
1346d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1347d9ae7f2bSJakub Kicinski 
1348d9ae7f2bSJakub Kicinski 	return 0;
1349d9ae7f2bSJakub Kicinski }
1350d9ae7f2bSJakub Kicinski 
1351d9ae7f2bSJakub Kicinski static void
1352d9ae7f2bSJakub Kicinski wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
1353d9ae7f2bSJakub Kicinski 		 enum br_mask br_mask, u16 off)
1354d9ae7f2bSJakub Kicinski {
1355d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
1356d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, br_mask, off, 0);
1357d9ae7f2bSJakub Kicinski }
1358d9ae7f2bSJakub Kicinski 
1359d9ae7f2bSJakub Kicinski static int
1360d9ae7f2bSJakub Kicinski wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1361d9ae7f2bSJakub Kicinski 	     enum alu_op alu_op, enum br_mask br_mask)
1362d9ae7f2bSJakub Kicinski {
1363d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1364d9ae7f2bSJakub Kicinski 
1365d9ae7f2bSJakub Kicinski 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
1366d9ae7f2bSJakub Kicinski 			 insn->src_reg * 2, br_mask, insn->off);
1367d9ae7f2bSJakub Kicinski 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
1368d9ae7f2bSJakub Kicinski 			 insn->src_reg * 2 + 1, br_mask, insn->off);
1369d9ae7f2bSJakub Kicinski 
1370d9ae7f2bSJakub Kicinski 	return 0;
1371d9ae7f2bSJakub Kicinski }
1372d9ae7f2bSJakub Kicinski 
137361dd8f00SJakub Kicinski static const struct jmp_code_map {
137461dd8f00SJakub Kicinski 	enum br_mask br_mask;
137561dd8f00SJakub Kicinski 	bool swap;
137661dd8f00SJakub Kicinski } jmp_code_map[] = {
137761dd8f00SJakub Kicinski 	[BPF_JGT >> 4]	= { BR_BLO, true },
137861dd8f00SJakub Kicinski 	[BPF_JGE >> 4]	= { BR_BHS, false },
137961dd8f00SJakub Kicinski 	[BPF_JLT >> 4]	= { BR_BLO, false },
138061dd8f00SJakub Kicinski 	[BPF_JLE >> 4]	= { BR_BHS, true },
138161dd8f00SJakub Kicinski 	[BPF_JSGT >> 4]	= { BR_BLT, true },
138261dd8f00SJakub Kicinski 	[BPF_JSGE >> 4]	= { BR_BGE, false },
138361dd8f00SJakub Kicinski 	[BPF_JSLT >> 4]	= { BR_BLT, false },
138461dd8f00SJakub Kicinski 	[BPF_JSLE >> 4]	= { BR_BGE, true },
138561dd8f00SJakub Kicinski };
138661dd8f00SJakub Kicinski 
138761dd8f00SJakub Kicinski static const struct jmp_code_map *nfp_jmp_code_get(struct nfp_insn_meta *meta)
138861dd8f00SJakub Kicinski {
138961dd8f00SJakub Kicinski 	unsigned int op;
139061dd8f00SJakub Kicinski 
139161dd8f00SJakub Kicinski 	op = BPF_OP(meta->insn.code) >> 4;
139261dd8f00SJakub Kicinski 	/* br_mask of 0 is BR_BEQ which we don't use in jump code table */
139361dd8f00SJakub Kicinski 	if (WARN_ONCE(op >= ARRAY_SIZE(jmp_code_map) ||
139461dd8f00SJakub Kicinski 		      !jmp_code_map[op].br_mask,
139561dd8f00SJakub Kicinski 		      "no code found for jump instruction"))
139661dd8f00SJakub Kicinski 		return NULL;
139761dd8f00SJakub Kicinski 
139861dd8f00SJakub Kicinski 	return &jmp_code_map[op];
139961dd8f00SJakub Kicinski }
140061dd8f00SJakub Kicinski 
140161dd8f00SJakub Kicinski static int cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1402d9ae7f2bSJakub Kicinski {
1403d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1404d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
140561dd8f00SJakub Kicinski 	const struct jmp_code_map *code;
14067bdc97beSJakub Kicinski 	enum alu_op alu_op, carry_op;
1407d9ae7f2bSJakub Kicinski 	u8 reg = insn->dst_reg * 2;
1408b3f868dfSJakub Kicinski 	swreg tmp_reg;
1409d9ae7f2bSJakub Kicinski 
141061dd8f00SJakub Kicinski 	code = nfp_jmp_code_get(meta);
141161dd8f00SJakub Kicinski 	if (!code)
141261dd8f00SJakub Kicinski 		return -EINVAL;
141361dd8f00SJakub Kicinski 
14147bdc97beSJakub Kicinski 	alu_op = meta->jump_neg_op ? ALU_OP_ADD : ALU_OP_SUB;
14157bdc97beSJakub Kicinski 	carry_op = meta->jump_neg_op ? ALU_OP_ADD_C : ALU_OP_SUB_C;
14167bdc97beSJakub Kicinski 
1417d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
141861dd8f00SJakub Kicinski 	if (!code->swap)
14197bdc97beSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), reg_a(reg), alu_op, tmp_reg);
1420d9ae7f2bSJakub Kicinski 	else
14217bdc97beSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), tmp_reg, alu_op, reg_a(reg));
1422d9ae7f2bSJakub Kicinski 
1423d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
142461dd8f00SJakub Kicinski 	if (!code->swap)
1425d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
14267bdc97beSJakub Kicinski 			 reg_a(reg + 1), carry_op, tmp_reg);
1427d9ae7f2bSJakub Kicinski 	else
1428d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
14297bdc97beSJakub Kicinski 			 tmp_reg, carry_op, reg_a(reg + 1));
1430d9ae7f2bSJakub Kicinski 
143161dd8f00SJakub Kicinski 	emit_br(nfp_prog, code->br_mask, insn->off, 0);
1432d9ae7f2bSJakub Kicinski 
1433d9ae7f2bSJakub Kicinski 	return 0;
1434d9ae7f2bSJakub Kicinski }
1435d9ae7f2bSJakub Kicinski 
143661dd8f00SJakub Kicinski static int cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1437d9ae7f2bSJakub Kicinski {
1438d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
143961dd8f00SJakub Kicinski 	const struct jmp_code_map *code;
144026fa818dSJakub Kicinski 	u8 areg, breg;
144126fa818dSJakub Kicinski 
144261dd8f00SJakub Kicinski 	code = nfp_jmp_code_get(meta);
144361dd8f00SJakub Kicinski 	if (!code)
144461dd8f00SJakub Kicinski 		return -EINVAL;
144561dd8f00SJakub Kicinski 
144626fa818dSJakub Kicinski 	areg = insn->dst_reg * 2;
144726fa818dSJakub Kicinski 	breg = insn->src_reg * 2;
1448d9ae7f2bSJakub Kicinski 
144961dd8f00SJakub Kicinski 	if (code->swap) {
1450d9ae7f2bSJakub Kicinski 		areg ^= breg;
1451d9ae7f2bSJakub Kicinski 		breg ^= areg;
1452d9ae7f2bSJakub Kicinski 		areg ^= breg;
1453d9ae7f2bSJakub Kicinski 	}
1454d9ae7f2bSJakub Kicinski 
1455d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
1456d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
1457d9ae7f2bSJakub Kicinski 		 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
145861dd8f00SJakub Kicinski 	emit_br(nfp_prog, code->br_mask, insn->off, 0);
1459d9ae7f2bSJakub Kicinski 
1460d9ae7f2bSJakub Kicinski 	return 0;
1461d9ae7f2bSJakub Kicinski }
1462d9ae7f2bSJakub Kicinski 
14633119d1fdSJakub Kicinski static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out)
14643119d1fdSJakub Kicinski {
14653119d1fdSJakub Kicinski 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in,
14663119d1fdSJakub Kicinski 		      SHF_SC_R_ROT, 8);
14673119d1fdSJakub Kicinski 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out),
14683119d1fdSJakub Kicinski 		      SHF_SC_R_ROT, 16);
14693119d1fdSJakub Kicinski }
14703119d1fdSJakub Kicinski 
1471d3d23fdbSJiong Wang static void
1472d3d23fdbSJiong Wang wrp_mul_u32(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
1473d3d23fdbSJiong Wang 	    swreg rreg, bool gen_high_half)
1474d3d23fdbSJiong Wang {
1475d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
1476d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_1, rreg);
1477d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_2, rreg);
1478d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_3, rreg);
1479d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_4, rreg);
1480d3d23fdbSJiong Wang 	emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_32x32, MUL_LAST, reg_none());
1481d3d23fdbSJiong Wang 	if (gen_high_half)
1482d3d23fdbSJiong Wang 		emit_mul(nfp_prog, dst_hi, MUL_TYPE_STEP_32x32, MUL_LAST_2,
1483d3d23fdbSJiong Wang 			 reg_none());
1484d3d23fdbSJiong Wang 	else
1485d3d23fdbSJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
1486d3d23fdbSJiong Wang }
1487d3d23fdbSJiong Wang 
1488d3d23fdbSJiong Wang static void
1489d3d23fdbSJiong Wang wrp_mul_u16(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
1490d3d23fdbSJiong Wang 	    swreg rreg)
1491d3d23fdbSJiong Wang {
1492d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
1493d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_1, rreg);
1494d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_2, rreg);
1495d3d23fdbSJiong Wang 	emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_16x16, MUL_LAST, reg_none());
1496d3d23fdbSJiong Wang }
1497d3d23fdbSJiong Wang 
1498d3d23fdbSJiong Wang static int
1499d3d23fdbSJiong Wang wrp_mul(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1500d3d23fdbSJiong Wang 	bool gen_high_half, bool ropnd_from_reg)
1501d3d23fdbSJiong Wang {
1502d3d23fdbSJiong Wang 	swreg multiplier, multiplicand, dst_hi, dst_lo;
1503d3d23fdbSJiong Wang 	const struct bpf_insn *insn = &meta->insn;
1504d3d23fdbSJiong Wang 	u32 lopnd_max, ropnd_max;
1505d3d23fdbSJiong Wang 	u8 dst_reg;
1506d3d23fdbSJiong Wang 
1507d3d23fdbSJiong Wang 	dst_reg = insn->dst_reg;
1508d3d23fdbSJiong Wang 	multiplicand = reg_a(dst_reg * 2);
1509d3d23fdbSJiong Wang 	dst_hi = reg_both(dst_reg * 2 + 1);
1510d3d23fdbSJiong Wang 	dst_lo = reg_both(dst_reg * 2);
1511d3d23fdbSJiong Wang 	lopnd_max = meta->umax_dst;
1512d3d23fdbSJiong Wang 	if (ropnd_from_reg) {
1513d3d23fdbSJiong Wang 		multiplier = reg_b(insn->src_reg * 2);
1514d3d23fdbSJiong Wang 		ropnd_max = meta->umax_src;
1515d3d23fdbSJiong Wang 	} else {
1516d3d23fdbSJiong Wang 		u32 imm = insn->imm;
1517d3d23fdbSJiong Wang 
1518d3d23fdbSJiong Wang 		multiplier = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
1519d3d23fdbSJiong Wang 		ropnd_max = imm;
1520d3d23fdbSJiong Wang 	}
1521d3d23fdbSJiong Wang 	if (lopnd_max > U16_MAX || ropnd_max > U16_MAX)
1522d3d23fdbSJiong Wang 		wrp_mul_u32(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier,
1523d3d23fdbSJiong Wang 			    gen_high_half);
1524d3d23fdbSJiong Wang 	else
1525d3d23fdbSJiong Wang 		wrp_mul_u16(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier);
1526d3d23fdbSJiong Wang 
1527d3d23fdbSJiong Wang 	return 0;
1528d3d23fdbSJiong Wang }
1529d3d23fdbSJiong Wang 
15302a952b03SJiong Wang static int wrp_div_imm(struct nfp_prog *nfp_prog, u8 dst, u64 imm)
15312a952b03SJiong Wang {
15322a952b03SJiong Wang 	swreg dst_both = reg_both(dst), dst_a = reg_a(dst), dst_b = reg_a(dst);
15339fb410a8SJiong Wang 	struct reciprocal_value_adv rvalue;
15349fb410a8SJiong Wang 	u8 pre_shift, exp;
15352a952b03SJiong Wang 	swreg magic;
15362a952b03SJiong Wang 
15372a952b03SJiong Wang 	if (imm > U32_MAX) {
15382a952b03SJiong Wang 		wrp_immed(nfp_prog, dst_both, 0);
15392a952b03SJiong Wang 		return 0;
15402a952b03SJiong Wang 	}
15412a952b03SJiong Wang 
15429fb410a8SJiong Wang 	/* NOTE: because we are using "reciprocal_value_adv" which doesn't
15439fb410a8SJiong Wang 	 * support "divisor > (1u << 31)", we need to JIT separate NFP sequence
15449fb410a8SJiong Wang 	 * to handle such case which actually equals to the result of unsigned
15459fb410a8SJiong Wang 	 * comparison "dst >= imm" which could be calculated using the following
15469fb410a8SJiong Wang 	 * NFP sequence:
15479fb410a8SJiong Wang 	 *
15489fb410a8SJiong Wang 	 *  alu[--, dst, -, imm]
15499fb410a8SJiong Wang 	 *  immed[imm, 0]
15509fb410a8SJiong Wang 	 *  alu[dst, imm, +carry, 0]
15519fb410a8SJiong Wang 	 *
15529fb410a8SJiong Wang 	 */
15539fb410a8SJiong Wang 	if (imm > 1U << 31) {
15549fb410a8SJiong Wang 		swreg tmp_b = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
15559fb410a8SJiong Wang 
15569fb410a8SJiong Wang 		emit_alu(nfp_prog, reg_none(), dst_a, ALU_OP_SUB, tmp_b);
15579fb410a8SJiong Wang 		wrp_immed(nfp_prog, imm_a(nfp_prog), 0);
15589fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, imm_a(nfp_prog), ALU_OP_ADD_C,
15599fb410a8SJiong Wang 			 reg_imm(0));
15609fb410a8SJiong Wang 		return 0;
15619fb410a8SJiong Wang 	}
15629fb410a8SJiong Wang 
15639fb410a8SJiong Wang 	rvalue = reciprocal_value_adv(imm, 32);
15649fb410a8SJiong Wang 	exp = rvalue.exp;
15659fb410a8SJiong Wang 	if (rvalue.is_wide_m && !(imm & 1)) {
15669fb410a8SJiong Wang 		pre_shift = fls(imm & -imm) - 1;
15679fb410a8SJiong Wang 		rvalue = reciprocal_value_adv(imm >> pre_shift, 32 - pre_shift);
15689fb410a8SJiong Wang 	} else {
15699fb410a8SJiong Wang 		pre_shift = 0;
15709fb410a8SJiong Wang 	}
15712a952b03SJiong Wang 	magic = ur_load_imm_any(nfp_prog, rvalue.m, imm_b(nfp_prog));
15729fb410a8SJiong Wang 	if (imm == 1U << exp) {
15732a952b03SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15749fb410a8SJiong Wang 			 SHF_SC_R_SHF, exp);
15759fb410a8SJiong Wang 	} else if (rvalue.is_wide_m) {
15769fb410a8SJiong Wang 		wrp_mul_u32(nfp_prog, imm_both(nfp_prog), reg_none(), dst_a,
15779fb410a8SJiong Wang 			    magic, true);
15789fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_SUB,
15799fb410a8SJiong Wang 			 imm_b(nfp_prog));
15802a952b03SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15819fb410a8SJiong Wang 			 SHF_SC_R_SHF, 1);
15829fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_ADD,
15839fb410a8SJiong Wang 			 imm_b(nfp_prog));
15849fb410a8SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15859fb410a8SJiong Wang 			 SHF_SC_R_SHF, rvalue.sh - 1);
15869fb410a8SJiong Wang 	} else {
15879fb410a8SJiong Wang 		if (pre_shift)
15889fb410a8SJiong Wang 			emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
15899fb410a8SJiong Wang 				 dst_b, SHF_SC_R_SHF, pre_shift);
15909fb410a8SJiong Wang 		wrp_mul_u32(nfp_prog, dst_both, reg_none(), dst_a, magic, true);
15919fb410a8SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
15929fb410a8SJiong Wang 			 dst_b, SHF_SC_R_SHF, rvalue.sh);
15939fb410a8SJiong Wang 	}
15942a952b03SJiong Wang 
15952a952b03SJiong Wang 	return 0;
15962a952b03SJiong Wang }
15972a952b03SJiong Wang 
15980d49eaf4SJakub Kicinski static int adjust_head(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
15990d49eaf4SJakub Kicinski {
16000d49eaf4SJakub Kicinski 	swreg tmp = imm_a(nfp_prog), tmp_len = imm_b(nfp_prog);
16010d49eaf4SJakub Kicinski 	struct nfp_bpf_cap_adjust_head *adjust_head;
16020d49eaf4SJakub Kicinski 	u32 ret_einval, end;
16030d49eaf4SJakub Kicinski 
16040d49eaf4SJakub Kicinski 	adjust_head = &nfp_prog->bpf->adjust_head;
16050d49eaf4SJakub Kicinski 
16068231f844SJakub Kicinski 	/* Optimized version - 5 vs 14 cycles */
16078231f844SJakub Kicinski 	if (nfp_prog->adjust_head_location != UINT_MAX) {
16088231f844SJakub Kicinski 		if (WARN_ON_ONCE(nfp_prog->adjust_head_location != meta->n))
16098231f844SJakub Kicinski 			return -EINVAL;
16108231f844SJakub Kicinski 
16118231f844SJakub Kicinski 		emit_alu(nfp_prog, pptr_reg(nfp_prog),
16128231f844SJakub Kicinski 			 reg_a(2 * 2), ALU_OP_ADD, pptr_reg(nfp_prog));
16138231f844SJakub Kicinski 		emit_alu(nfp_prog, plen_reg(nfp_prog),
16148231f844SJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16158231f844SJakub Kicinski 		emit_alu(nfp_prog, pv_len(nfp_prog),
16168231f844SJakub Kicinski 			 pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16178231f844SJakub Kicinski 
16188231f844SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(0), 0);
16198231f844SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(1), 0);
16208231f844SJakub Kicinski 
16218231f844SJakub Kicinski 		/* TODO: when adjust head is guaranteed to succeed we can
16228231f844SJakub Kicinski 		 * also eliminate the following if (r0 == 0) branch.
16238231f844SJakub Kicinski 		 */
16248231f844SJakub Kicinski 
16258231f844SJakub Kicinski 		return 0;
16268231f844SJakub Kicinski 	}
16278231f844SJakub Kicinski 
16280d49eaf4SJakub Kicinski 	ret_einval = nfp_prog_current_offset(nfp_prog) + 14;
16290d49eaf4SJakub Kicinski 	end = ret_einval + 2;
16300d49eaf4SJakub Kicinski 
16310d49eaf4SJakub Kicinski 	/* We need to use a temp because offset is just a part of the pkt ptr */
16320d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, tmp,
16330d49eaf4SJakub Kicinski 		 reg_a(2 * 2), ALU_OP_ADD_2B, pptr_reg(nfp_prog));
16340d49eaf4SJakub Kicinski 
16350d49eaf4SJakub Kicinski 	/* Validate result will fit within FW datapath constraints */
16360d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16370d49eaf4SJakub Kicinski 		 tmp, ALU_OP_SUB, reg_imm(adjust_head->off_min));
16380d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BLO, ret_einval, 0);
16390d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16400d49eaf4SJakub Kicinski 		 reg_imm(adjust_head->off_max), ALU_OP_SUB, tmp);
16410d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BLO, ret_einval, 0);
16420d49eaf4SJakub Kicinski 
16430d49eaf4SJakub Kicinski 	/* Validate the length is at least ETH_HLEN */
16440d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, tmp_len,
16450d49eaf4SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16460d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16470d49eaf4SJakub Kicinski 		 tmp_len, ALU_OP_SUB, reg_imm(ETH_HLEN));
16480d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BMI, ret_einval, 0);
16490d49eaf4SJakub Kicinski 
16500d49eaf4SJakub Kicinski 	/* Load the ret code */
16510d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), 0);
16520d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), 0);
16530d49eaf4SJakub Kicinski 
16540d49eaf4SJakub Kicinski 	/* Modify the packet metadata */
16550d49eaf4SJakub Kicinski 	emit_ld_field(nfp_prog, pptr_reg(nfp_prog), 0x3, tmp, SHF_SC_NONE, 0);
16560d49eaf4SJakub Kicinski 
16570d49eaf4SJakub Kicinski 	/* Skip over the -EINVAL ret code (defer 2) */
16582314fe9eSJakub Kicinski 	emit_br(nfp_prog, BR_UNC, end, 2);
16590d49eaf4SJakub Kicinski 
16600d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
16610d49eaf4SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16620d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, pv_len(nfp_prog),
16630d49eaf4SJakub Kicinski 		 pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16640d49eaf4SJakub Kicinski 
16650d49eaf4SJakub Kicinski 	/* return -EINVAL target */
16660d49eaf4SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
16670d49eaf4SJakub Kicinski 		return -EINVAL;
16680d49eaf4SJakub Kicinski 
16690d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), -22);
16700d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), ~0);
16710d49eaf4SJakub Kicinski 
16720d49eaf4SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, end))
16730d49eaf4SJakub Kicinski 		return -EINVAL;
16740d49eaf4SJakub Kicinski 
16750d49eaf4SJakub Kicinski 	return 0;
16760d49eaf4SJakub Kicinski }
16770d49eaf4SJakub Kicinski 
16780c261593SJakub Kicinski static int adjust_tail(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
16790c261593SJakub Kicinski {
16800c261593SJakub Kicinski 	u32 ret_einval, end;
16810c261593SJakub Kicinski 	swreg plen, delta;
16820c261593SJakub Kicinski 
16830c261593SJakub Kicinski 	BUILD_BUG_ON(plen_reg(nfp_prog) != reg_b(STATIC_REG_PKT_LEN));
16840c261593SJakub Kicinski 
16850c261593SJakub Kicinski 	plen = imm_a(nfp_prog);
16860c261593SJakub Kicinski 	delta = reg_a(2 * 2);
16870c261593SJakub Kicinski 
16880c261593SJakub Kicinski 	ret_einval = nfp_prog_current_offset(nfp_prog) + 9;
16890c261593SJakub Kicinski 	end = nfp_prog_current_offset(nfp_prog) + 11;
16900c261593SJakub Kicinski 
16910c261593SJakub Kicinski 	/* Calculate resulting length */
16920c261593SJakub Kicinski 	emit_alu(nfp_prog, plen, plen_reg(nfp_prog), ALU_OP_ADD, delta);
16930c261593SJakub Kicinski 	/* delta == 0 is not allowed by the kernel, add must overflow to make
16940c261593SJakub Kicinski 	 * length smaller.
16950c261593SJakub Kicinski 	 */
16960c261593SJakub Kicinski 	emit_br(nfp_prog, BR_BCC, ret_einval, 0);
16970c261593SJakub Kicinski 
16980c261593SJakub Kicinski 	/* if (new_len < 14) then -EINVAL */
16990c261593SJakub Kicinski 	emit_alu(nfp_prog, reg_none(), plen, ALU_OP_SUB, reg_imm(ETH_HLEN));
17000c261593SJakub Kicinski 	emit_br(nfp_prog, BR_BMI, ret_einval, 0);
17010c261593SJakub Kicinski 
17020c261593SJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
17030c261593SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_ADD, delta);
17040c261593SJakub Kicinski 	emit_alu(nfp_prog, pv_len(nfp_prog),
17050c261593SJakub Kicinski 		 pv_len(nfp_prog), ALU_OP_ADD, delta);
17060c261593SJakub Kicinski 
17070c261593SJakub Kicinski 	emit_br(nfp_prog, BR_UNC, end, 2);
17080c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), 0);
17090c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), 0);
17100c261593SJakub Kicinski 
17110c261593SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
17120c261593SJakub Kicinski 		return -EINVAL;
17130c261593SJakub Kicinski 
17140c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), -22);
17150c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), ~0);
17160c261593SJakub Kicinski 
17170c261593SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, end))
17180c261593SJakub Kicinski 		return -EINVAL;
17190c261593SJakub Kicinski 
17200c261593SJakub Kicinski 	return 0;
17210c261593SJakub Kicinski }
17220c261593SJakub Kicinski 
172377a3d311SJakub Kicinski static int
1724fc448497SJakub Kicinski map_call_stack_common(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
172577a3d311SJakub Kicinski {
172677a3d311SJakub Kicinski 	bool load_lm_ptr;
172777a3d311SJakub Kicinski 	u32 ret_tgt;
172877a3d311SJakub Kicinski 	s64 lm_off;
172977a3d311SJakub Kicinski 
173077a3d311SJakub Kicinski 	/* We only have to reload LM0 if the key is not at start of stack */
17311a7e62e6SQuentin Monnet 	lm_off = nfp_prog->stack_frame_depth;
17322f46e0c1SJakub Kicinski 	lm_off += meta->arg2.reg.var_off.value + meta->arg2.reg.off;
17332f46e0c1SJakub Kicinski 	load_lm_ptr = meta->arg2.var_off || lm_off;
173477a3d311SJakub Kicinski 
173577a3d311SJakub Kicinski 	/* Set LM0 to start of key */
173677a3d311SJakub Kicinski 	if (load_lm_ptr)
173777a3d311SJakub Kicinski 		emit_csr_wr(nfp_prog, reg_b(2 * 2), NFP_CSR_ACT_LM_ADDR0);
173844d65a47SJakub Kicinski 	if (meta->func_id == BPF_FUNC_map_update_elem)
173944d65a47SJakub Kicinski 		emit_csr_wr(nfp_prog, reg_b(3 * 2), NFP_CSR_ACT_LM_ADDR2);
174077a3d311SJakub Kicinski 
1741fc448497SJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
174277a3d311SJakub Kicinski 		     2, RELO_BR_HELPER);
174377a3d311SJakub Kicinski 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
174477a3d311SJakub Kicinski 
174577a3d311SJakub Kicinski 	/* Load map ID into A0 */
1746b4264c96SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), reg_a(2));
174777a3d311SJakub Kicinski 
174877a3d311SJakub Kicinski 	/* Load the return address into B0 */
174977a3d311SJakub Kicinski 	wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
175077a3d311SJakub Kicinski 
175177a3d311SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
175277a3d311SJakub Kicinski 		return -EINVAL;
175377a3d311SJakub Kicinski 
175477a3d311SJakub Kicinski 	/* Reset the LM0 pointer */
175577a3d311SJakub Kicinski 	if (!load_lm_ptr)
175677a3d311SJakub Kicinski 		return 0;
175777a3d311SJakub Kicinski 
175877a3d311SJakub Kicinski 	emit_csr_wr(nfp_prog, stack_reg(nfp_prog), NFP_CSR_ACT_LM_ADDR0);
175977a3d311SJakub Kicinski 	wrp_nops(nfp_prog, 3);
176077a3d311SJakub Kicinski 
176177a3d311SJakub Kicinski 	return 0;
176277a3d311SJakub Kicinski }
176377a3d311SJakub Kicinski 
1764df4a37d8SJakub Kicinski static int
1765df4a37d8SJakub Kicinski nfp_get_prandom_u32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1766df4a37d8SJakub Kicinski {
1767df4a37d8SJakub Kicinski 	__emit_csr_rd(nfp_prog, NFP_CSR_PSEUDO_RND_NUM);
1768df4a37d8SJakub Kicinski 	/* CSR value is read in following immed[gpr, 0] */
1769df4a37d8SJakub Kicinski 	emit_immed(nfp_prog, reg_both(0), 0,
1770df4a37d8SJakub Kicinski 		   IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
1771df4a37d8SJakub Kicinski 	emit_immed(nfp_prog, reg_both(1), 0,
1772df4a37d8SJakub Kicinski 		   IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
1773df4a37d8SJakub Kicinski 	return 0;
1774df4a37d8SJakub Kicinski }
1775df4a37d8SJakub Kicinski 
17769816dd35SJakub Kicinski static int
17779816dd35SJakub Kicinski nfp_perf_event_output(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
17789816dd35SJakub Kicinski {
17799816dd35SJakub Kicinski 	swreg ptr_type;
17809816dd35SJakub Kicinski 	u32 ret_tgt;
17819816dd35SJakub Kicinski 
17829816dd35SJakub Kicinski 	ptr_type = ur_load_imm_any(nfp_prog, meta->arg1.type, imm_a(nfp_prog));
17839816dd35SJakub Kicinski 
17849816dd35SJakub Kicinski 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
17859816dd35SJakub Kicinski 
17869816dd35SJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
17879816dd35SJakub Kicinski 		     2, RELO_BR_HELPER);
17889816dd35SJakub Kicinski 
17899816dd35SJakub Kicinski 	/* Load ptr type into A1 */
17909816dd35SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(1), ptr_type);
17919816dd35SJakub Kicinski 
17929816dd35SJakub Kicinski 	/* Load the return address into B0 */
17939816dd35SJakub Kicinski 	wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
17949816dd35SJakub Kicinski 
17959816dd35SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
17969816dd35SJakub Kicinski 		return -EINVAL;
17979816dd35SJakub Kicinski 
17989816dd35SJakub Kicinski 	return 0;
17999816dd35SJakub Kicinski }
18009816dd35SJakub Kicinski 
1801d985888fSJakub Kicinski static int
1802d985888fSJakub Kicinski nfp_queue_select(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1803d985888fSJakub Kicinski {
1804d985888fSJakub Kicinski 	u32 jmp_tgt;
1805d985888fSJakub Kicinski 
1806d985888fSJakub Kicinski 	jmp_tgt = nfp_prog_current_offset(nfp_prog) + 5;
1807d985888fSJakub Kicinski 
1808d985888fSJakub Kicinski 	/* Make sure the queue id fits into FW field */
1809d985888fSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(meta->insn.src_reg * 2),
1810d985888fSJakub Kicinski 		 ALU_OP_AND_NOT_B, reg_imm(0xff));
1811d985888fSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, jmp_tgt, 2);
1812d985888fSJakub Kicinski 
1813d985888fSJakub Kicinski 	/* Set the 'queue selected' bit and the queue value */
1814d985888fSJakub Kicinski 	emit_shf(nfp_prog, pv_qsel_set(nfp_prog),
1815d985888fSJakub Kicinski 		 pv_qsel_set(nfp_prog), SHF_OP_OR, reg_imm(1),
1816d985888fSJakub Kicinski 		 SHF_SC_L_SHF, PKT_VEL_QSEL_SET_BIT);
1817d985888fSJakub Kicinski 	emit_ld_field(nfp_prog,
1818d985888fSJakub Kicinski 		      pv_qsel_val(nfp_prog), 0x1, reg_b(meta->insn.src_reg * 2),
1819d985888fSJakub Kicinski 		      SHF_SC_NONE, 0);
1820d985888fSJakub Kicinski 	/* Delay slots end here, we will jump over next instruction if queue
1821d985888fSJakub Kicinski 	 * value fits into the field.
1822d985888fSJakub Kicinski 	 */
1823d985888fSJakub Kicinski 	emit_ld_field(nfp_prog,
1824d985888fSJakub Kicinski 		      pv_qsel_val(nfp_prog), 0x1, reg_imm(NFP_NET_RXR_MAX),
1825d985888fSJakub Kicinski 		      SHF_SC_NONE, 0);
1826d985888fSJakub Kicinski 
1827d985888fSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, jmp_tgt))
1828d985888fSJakub Kicinski 		return -EINVAL;
1829d985888fSJakub Kicinski 
1830d985888fSJakub Kicinski 	return 0;
1831d985888fSJakub Kicinski }
1832d985888fSJakub Kicinski 
1833d9ae7f2bSJakub Kicinski /* --- Callbacks --- */
1834d9ae7f2bSJakub Kicinski static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1835d9ae7f2bSJakub Kicinski {
1836d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1837b14157eeSJakub Kicinski 	u8 dst = insn->dst_reg * 2;
1838b14157eeSJakub Kicinski 	u8 src = insn->src_reg * 2;
1839d9ae7f2bSJakub Kicinski 
1840b14157eeSJakub Kicinski 	if (insn->src_reg == BPF_REG_10) {
1841b14157eeSJakub Kicinski 		swreg stack_depth_reg;
1842b14157eeSJakub Kicinski 
1843b14157eeSJakub Kicinski 		stack_depth_reg = ur_load_imm_any(nfp_prog,
18441a7e62e6SQuentin Monnet 						  nfp_prog->stack_frame_depth,
1845b14157eeSJakub Kicinski 						  stack_imm(nfp_prog));
18461a7e62e6SQuentin Monnet 		emit_alu(nfp_prog, reg_both(dst), stack_reg(nfp_prog),
18471a7e62e6SQuentin Monnet 			 ALU_OP_ADD, stack_depth_reg);
1848b14157eeSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
1849b14157eeSJakub Kicinski 	} else {
1850b14157eeSJakub Kicinski 		wrp_reg_mov(nfp_prog, dst, src);
1851b14157eeSJakub Kicinski 		wrp_reg_mov(nfp_prog, dst + 1, src + 1);
1852b14157eeSJakub Kicinski 	}
1853d9ae7f2bSJakub Kicinski 
1854d9ae7f2bSJakub Kicinski 	return 0;
1855d9ae7f2bSJakub Kicinski }
1856d9ae7f2bSJakub Kicinski 
1857d9ae7f2bSJakub Kicinski static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1858d9ae7f2bSJakub Kicinski {
1859d9ae7f2bSJakub Kicinski 	u64 imm = meta->insn.imm; /* sign extend */
1860d9ae7f2bSJakub Kicinski 
1861d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
1862d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
1863d9ae7f2bSJakub Kicinski 
1864d9ae7f2bSJakub Kicinski 	return 0;
1865d9ae7f2bSJakub Kicinski }
1866d9ae7f2bSJakub Kicinski 
1867d9ae7f2bSJakub Kicinski static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1868d9ae7f2bSJakub Kicinski {
1869d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
1870d9ae7f2bSJakub Kicinski }
1871d9ae7f2bSJakub Kicinski 
1872d9ae7f2bSJakub Kicinski static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1873d9ae7f2bSJakub Kicinski {
1874d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
1875d9ae7f2bSJakub Kicinski }
1876d9ae7f2bSJakub Kicinski 
1877d9ae7f2bSJakub Kicinski static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1878d9ae7f2bSJakub Kicinski {
1879d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
1880d9ae7f2bSJakub Kicinski }
1881d9ae7f2bSJakub Kicinski 
1882d9ae7f2bSJakub Kicinski static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1883d9ae7f2bSJakub Kicinski {
1884d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
1885d9ae7f2bSJakub Kicinski }
1886d9ae7f2bSJakub Kicinski 
1887d9ae7f2bSJakub Kicinski static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1888d9ae7f2bSJakub Kicinski {
1889d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
1890d9ae7f2bSJakub Kicinski }
1891d9ae7f2bSJakub Kicinski 
1892d9ae7f2bSJakub Kicinski static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1893d9ae7f2bSJakub Kicinski {
1894d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
1895d9ae7f2bSJakub Kicinski }
1896d9ae7f2bSJakub Kicinski 
1897d9ae7f2bSJakub Kicinski static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1898d9ae7f2bSJakub Kicinski {
1899d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1900d9ae7f2bSJakub Kicinski 
1901d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
1902d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_ADD,
1903d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2));
1904d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
1905d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
1906d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2 + 1));
1907d9ae7f2bSJakub Kicinski 
1908d9ae7f2bSJakub Kicinski 	return 0;
1909d9ae7f2bSJakub Kicinski }
1910d9ae7f2bSJakub Kicinski 
1911d9ae7f2bSJakub Kicinski static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1912d9ae7f2bSJakub Kicinski {
1913d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1914d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1915d9ae7f2bSJakub Kicinski 
1916d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
1917d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
1918d9ae7f2bSJakub Kicinski 
1919d9ae7f2bSJakub Kicinski 	return 0;
1920d9ae7f2bSJakub Kicinski }
1921d9ae7f2bSJakub Kicinski 
1922d9ae7f2bSJakub Kicinski static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1923d9ae7f2bSJakub Kicinski {
1924d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1925d9ae7f2bSJakub Kicinski 
1926d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
1927d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_SUB,
1928d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2));
1929d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
1930d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
1931d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2 + 1));
1932d9ae7f2bSJakub Kicinski 
1933d9ae7f2bSJakub Kicinski 	return 0;
1934d9ae7f2bSJakub Kicinski }
1935d9ae7f2bSJakub Kicinski 
1936d9ae7f2bSJakub Kicinski static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1937d9ae7f2bSJakub Kicinski {
1938d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1939d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1940d9ae7f2bSJakub Kicinski 
1941d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
1942d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
1943d9ae7f2bSJakub Kicinski 
1944d9ae7f2bSJakub Kicinski 	return 0;
1945d9ae7f2bSJakub Kicinski }
1946d9ae7f2bSJakub Kicinski 
1947d3d23fdbSJiong Wang static int mul_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1948d3d23fdbSJiong Wang {
1949d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, true, true);
1950d3d23fdbSJiong Wang }
1951d3d23fdbSJiong Wang 
1952d3d23fdbSJiong Wang static int mul_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1953d3d23fdbSJiong Wang {
1954d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, true, false);
1955d3d23fdbSJiong Wang }
1956d3d23fdbSJiong Wang 
19572a952b03SJiong Wang static int div_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
19582a952b03SJiong Wang {
19592a952b03SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
19602a952b03SJiong Wang 
19612a952b03SJiong Wang 	return wrp_div_imm(nfp_prog, insn->dst_reg * 2, insn->imm);
19622a952b03SJiong Wang }
19632a952b03SJiong Wang 
19642a952b03SJiong Wang static int div_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
19652a952b03SJiong Wang {
19662a952b03SJiong Wang 	/* NOTE: verifier hook has rejected cases for which verifier doesn't
19672a952b03SJiong Wang 	 * know whether the source operand is constant or not.
19682a952b03SJiong Wang 	 */
19692a952b03SJiong Wang 	return wrp_div_imm(nfp_prog, meta->insn.dst_reg * 2, meta->umin_src);
19702a952b03SJiong Wang }
19712a952b03SJiong Wang 
1972254ef4d7SJiong Wang static int neg_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1973254ef4d7SJiong Wang {
1974254ef4d7SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
1975254ef4d7SJiong Wang 
1976254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), reg_imm(0),
1977254ef4d7SJiong Wang 		 ALU_OP_SUB, reg_b(insn->dst_reg * 2));
1978254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), reg_imm(0),
1979254ef4d7SJiong Wang 		 ALU_OP_SUB_C, reg_b(insn->dst_reg * 2 + 1));
1980254ef4d7SJiong Wang 
1981254ef4d7SJiong Wang 	return 0;
1982254ef4d7SJiong Wang }
1983254ef4d7SJiong Wang 
1984991f5b36SJiong Wang /* Pseudo code:
1985991f5b36SJiong Wang  *   if shift_amt >= 32
1986991f5b36SJiong Wang  *     dst_high = dst_low << shift_amt[4:0]
1987991f5b36SJiong Wang  *     dst_low = 0;
1988991f5b36SJiong Wang  *   else
1989991f5b36SJiong Wang  *     dst_high = (dst_high, dst_low) >> (32 - shift_amt)
1990991f5b36SJiong Wang  *     dst_low = dst_low << shift_amt
1991991f5b36SJiong Wang  *
1992991f5b36SJiong Wang  * The indirect shift will use the same logic at runtime.
1993991f5b36SJiong Wang  */
1994991f5b36SJiong Wang static int __shl_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
1995991f5b36SJiong Wang {
1996991f5b36SJiong Wang 	if (shift_amt < 32) {
1997991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_a(dst + 1),
1998991f5b36SJiong Wang 			 SHF_OP_NONE, reg_b(dst), SHF_SC_R_DSHF,
1999991f5b36SJiong Wang 			 32 - shift_amt);
2000991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2001991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_L_SHF, shift_amt);
2002991f5b36SJiong Wang 	} else if (shift_amt == 32) {
2003991f5b36SJiong Wang 		wrp_reg_mov(nfp_prog, dst + 1, dst);
2004991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst), 0);
2005991f5b36SJiong Wang 	} else if (shift_amt > 32) {
2006991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2007991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_L_SHF, shift_amt - 32);
2008991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst), 0);
2009991f5b36SJiong Wang 	}
2010991f5b36SJiong Wang 
2011991f5b36SJiong Wang 	return 0;
2012991f5b36SJiong Wang }
2013991f5b36SJiong Wang 
2014d9ae7f2bSJakub Kicinski static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2015d9ae7f2bSJakub Kicinski {
2016d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
20173cae1319SJakub Kicinski 	u8 dst = insn->dst_reg * 2;
2018d9ae7f2bSJakub Kicinski 
2019991f5b36SJiong Wang 	return __shl_imm64(nfp_prog, dst, insn->imm);
2020991f5b36SJiong Wang }
2021991f5b36SJiong Wang 
2022991f5b36SJiong Wang static void shl_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2023991f5b36SJiong Wang {
2024991f5b36SJiong Wang 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_imm(32), ALU_OP_SUB,
2025991f5b36SJiong Wang 		 reg_b(src));
2026991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), imm_a(nfp_prog), ALU_OP_OR, reg_imm(0));
2027991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_a(dst + 1), SHF_OP_NONE,
2028991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_R_DSHF);
2029991f5b36SJiong Wang }
2030991f5b36SJiong Wang 
2031991f5b36SJiong Wang /* NOTE: for indirect left shift, HIGH part should be calculated first. */
2032991f5b36SJiong Wang static void shl_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2033991f5b36SJiong Wang {
2034991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2035991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2036991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_L_SHF);
2037991f5b36SJiong Wang }
2038991f5b36SJiong Wang 
2039991f5b36SJiong Wang static void shl_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2040991f5b36SJiong Wang {
2041991f5b36SJiong Wang 	shl_reg64_lt32_high(nfp_prog, dst, src);
2042991f5b36SJiong Wang 	shl_reg64_lt32_low(nfp_prog, dst, src);
2043991f5b36SJiong Wang }
2044991f5b36SJiong Wang 
2045991f5b36SJiong Wang static void shl_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2046991f5b36SJiong Wang {
2047991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2048991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2049991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_L_SHF);
20503cae1319SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst), 0);
2051991f5b36SJiong Wang }
2052991f5b36SJiong Wang 
2053991f5b36SJiong Wang static int shl_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2054991f5b36SJiong Wang {
2055991f5b36SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2056991f5b36SJiong Wang 	u64 umin, umax;
2057991f5b36SJiong Wang 	u8 dst, src;
2058991f5b36SJiong Wang 
2059991f5b36SJiong Wang 	dst = insn->dst_reg * 2;
2060662c5472SJiong Wang 	umin = meta->umin_src;
2061662c5472SJiong Wang 	umax = meta->umax_src;
2062991f5b36SJiong Wang 	if (umin == umax)
2063991f5b36SJiong Wang 		return __shl_imm64(nfp_prog, dst, umin);
2064991f5b36SJiong Wang 
2065991f5b36SJiong Wang 	src = insn->src_reg * 2;
2066991f5b36SJiong Wang 	if (umax < 32) {
2067991f5b36SJiong Wang 		shl_reg64_lt32(nfp_prog, dst, src);
2068991f5b36SJiong Wang 	} else if (umin >= 32) {
2069991f5b36SJiong Wang 		shl_reg64_ge32(nfp_prog, dst, src);
2070991f5b36SJiong Wang 	} else {
2071991f5b36SJiong Wang 		/* Generate different instruction sequences depending on runtime
2072991f5b36SJiong Wang 		 * value of shift amount.
2073991f5b36SJiong Wang 		 */
2074991f5b36SJiong Wang 		u16 label_ge32, label_end;
2075991f5b36SJiong Wang 
2076991f5b36SJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 7;
2077991f5b36SJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2078991f5b36SJiong Wang 
2079991f5b36SJiong Wang 		shl_reg64_lt32_high(nfp_prog, dst, src);
2080991f5b36SJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2081991f5b36SJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2082991f5b36SJiong Wang 		/* shl_reg64_lt32_low packed in delay slot. */
2083991f5b36SJiong Wang 		shl_reg64_lt32_low(nfp_prog, dst, src);
2084991f5b36SJiong Wang 
2085991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2086991f5b36SJiong Wang 			return -EINVAL;
2087991f5b36SJiong Wang 		shl_reg64_ge32(nfp_prog, dst, src);
2088991f5b36SJiong Wang 
2089991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2090991f5b36SJiong Wang 			return -EINVAL;
2091991f5b36SJiong Wang 	}
2092991f5b36SJiong Wang 
2093991f5b36SJiong Wang 	return 0;
2094991f5b36SJiong Wang }
2095991f5b36SJiong Wang 
2096991f5b36SJiong Wang /* Pseudo code:
2097991f5b36SJiong Wang  *   if shift_amt >= 32
2098991f5b36SJiong Wang  *     dst_high = 0;
2099991f5b36SJiong Wang  *     dst_low = dst_high >> shift_amt[4:0]
2100991f5b36SJiong Wang  *   else
2101991f5b36SJiong Wang  *     dst_high = dst_high >> shift_amt
2102991f5b36SJiong Wang  *     dst_low = (dst_high, dst_low) >> shift_amt
2103991f5b36SJiong Wang  *
2104991f5b36SJiong Wang  * The indirect shift will use the same logic at runtime.
2105991f5b36SJiong Wang  */
2106991f5b36SJiong Wang static int __shr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
2107991f5b36SJiong Wang {
2108991f5b36SJiong Wang 	if (shift_amt < 32) {
2109991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2110991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_R_DSHF, shift_amt);
2111991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2112991f5b36SJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
2113991f5b36SJiong Wang 	} else if (shift_amt == 32) {
2114991f5b36SJiong Wang 		wrp_reg_mov(nfp_prog, dst, dst + 1);
2115991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
2116991f5b36SJiong Wang 	} else if (shift_amt > 32) {
2117991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2118991f5b36SJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
2119991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
21203cae1319SJakub Kicinski 	}
2121d9ae7f2bSJakub Kicinski 
2122d9ae7f2bSJakub Kicinski 	return 0;
2123d9ae7f2bSJakub Kicinski }
2124d9ae7f2bSJakub Kicinski 
2125d9ae7f2bSJakub Kicinski static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2126d9ae7f2bSJakub Kicinski {
2127d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
21283cae1319SJakub Kicinski 	u8 dst = insn->dst_reg * 2;
2129d9ae7f2bSJakub Kicinski 
2130991f5b36SJiong Wang 	return __shr_imm64(nfp_prog, dst, insn->imm);
2131991f5b36SJiong Wang }
2132991f5b36SJiong Wang 
2133991f5b36SJiong Wang /* NOTE: for indirect right shift, LOW part should be calculated first. */
2134991f5b36SJiong Wang static void shr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2135991f5b36SJiong Wang {
2136991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2137991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2138991f5b36SJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2139991f5b36SJiong Wang }
2140991f5b36SJiong Wang 
2141991f5b36SJiong Wang static void shr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2142991f5b36SJiong Wang {
2143991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2144991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2145991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_R_DSHF);
2146991f5b36SJiong Wang }
2147991f5b36SJiong Wang 
2148991f5b36SJiong Wang static void shr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2149991f5b36SJiong Wang {
2150991f5b36SJiong Wang 	shr_reg64_lt32_low(nfp_prog, dst, src);
2151991f5b36SJiong Wang 	shr_reg64_lt32_high(nfp_prog, dst, src);
2152991f5b36SJiong Wang }
2153991f5b36SJiong Wang 
2154991f5b36SJiong Wang static void shr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2155991f5b36SJiong Wang {
2156991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2157991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2158991f5b36SJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
21593cae1319SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst + 1), 0);
2160991f5b36SJiong Wang }
2161991f5b36SJiong Wang 
2162991f5b36SJiong Wang static int shr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2163991f5b36SJiong Wang {
2164991f5b36SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2165991f5b36SJiong Wang 	u64 umin, umax;
2166991f5b36SJiong Wang 	u8 dst, src;
2167991f5b36SJiong Wang 
2168991f5b36SJiong Wang 	dst = insn->dst_reg * 2;
2169662c5472SJiong Wang 	umin = meta->umin_src;
2170662c5472SJiong Wang 	umax = meta->umax_src;
2171991f5b36SJiong Wang 	if (umin == umax)
2172991f5b36SJiong Wang 		return __shr_imm64(nfp_prog, dst, umin);
2173991f5b36SJiong Wang 
2174991f5b36SJiong Wang 	src = insn->src_reg * 2;
2175991f5b36SJiong Wang 	if (umax < 32) {
2176991f5b36SJiong Wang 		shr_reg64_lt32(nfp_prog, dst, src);
2177991f5b36SJiong Wang 	} else if (umin >= 32) {
2178991f5b36SJiong Wang 		shr_reg64_ge32(nfp_prog, dst, src);
2179991f5b36SJiong Wang 	} else {
2180991f5b36SJiong Wang 		/* Generate different instruction sequences depending on runtime
2181991f5b36SJiong Wang 		 * value of shift amount.
2182991f5b36SJiong Wang 		 */
2183991f5b36SJiong Wang 		u16 label_ge32, label_end;
2184991f5b36SJiong Wang 
2185991f5b36SJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
2186991f5b36SJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2187991f5b36SJiong Wang 		shr_reg64_lt32_low(nfp_prog, dst, src);
2188991f5b36SJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2189991f5b36SJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2190991f5b36SJiong Wang 		/* shr_reg64_lt32_high packed in delay slot. */
2191991f5b36SJiong Wang 		shr_reg64_lt32_high(nfp_prog, dst, src);
2192991f5b36SJiong Wang 
2193991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2194991f5b36SJiong Wang 			return -EINVAL;
2195991f5b36SJiong Wang 		shr_reg64_ge32(nfp_prog, dst, src);
2196991f5b36SJiong Wang 
2197991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2198991f5b36SJiong Wang 			return -EINVAL;
21993cae1319SJakub Kicinski 	}
2200d9ae7f2bSJakub Kicinski 
2201d9ae7f2bSJakub Kicinski 	return 0;
2202d9ae7f2bSJakub Kicinski }
2203d9ae7f2bSJakub Kicinski 
2204f43d0f17SJiong Wang /* Code logic is the same as __shr_imm64 except ashr requires signedness bit
2205f43d0f17SJiong Wang  * told through PREV_ALU result.
2206f43d0f17SJiong Wang  */
2207c217abccSJiong Wang static int __ashr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
2208c217abccSJiong Wang {
2209c217abccSJiong Wang 	if (shift_amt < 32) {
2210c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2211c217abccSJiong Wang 			 reg_b(dst), SHF_SC_R_DSHF, shift_amt);
2212c217abccSJiong Wang 		/* Set signedness bit. */
2213c217abccSJiong Wang 		emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
2214c217abccSJiong Wang 			 reg_imm(0));
2215c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2216c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
2217c217abccSJiong Wang 	} else if (shift_amt == 32) {
2218c217abccSJiong Wang 		/* NOTE: this also helps setting signedness bit. */
2219c217abccSJiong Wang 		wrp_reg_mov(nfp_prog, dst, dst + 1);
2220c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2221c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2222c217abccSJiong Wang 	} else if (shift_amt > 32) {
2223c217abccSJiong Wang 		emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
2224c217abccSJiong Wang 			 reg_imm(0));
2225c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
2226c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
2227c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2228c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2229c217abccSJiong Wang 	}
2230c217abccSJiong Wang 
2231c217abccSJiong Wang 	return 0;
2232c217abccSJiong Wang }
2233c217abccSJiong Wang 
2234f43d0f17SJiong Wang static int ashr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2235f43d0f17SJiong Wang {
2236f43d0f17SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2237f43d0f17SJiong Wang 	u8 dst = insn->dst_reg * 2;
2238f43d0f17SJiong Wang 
2239c217abccSJiong Wang 	return __ashr_imm64(nfp_prog, dst, insn->imm);
2240c217abccSJiong Wang }
2241c217abccSJiong Wang 
2242c217abccSJiong Wang static void ashr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2243c217abccSJiong Wang {
2244c217abccSJiong Wang 	/* NOTE: the first insn will set both indirect shift amount (source A)
2245c217abccSJiong Wang 	 * and signedness bit (MSB of result).
2246c217abccSJiong Wang 	 */
2247c217abccSJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
2248c217abccSJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2249c217abccSJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2250c217abccSJiong Wang }
2251c217abccSJiong Wang 
2252c217abccSJiong Wang static void ashr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2253c217abccSJiong Wang {
2254c217abccSJiong Wang 	/* NOTE: it is the same as logic shift because we don't need to shift in
2255c217abccSJiong Wang 	 * signedness bit when the shift amount is less than 32.
2256c217abccSJiong Wang 	 */
2257c217abccSJiong Wang 	return shr_reg64_lt32_low(nfp_prog, dst, src);
2258c217abccSJiong Wang }
2259c217abccSJiong Wang 
2260c217abccSJiong Wang static void ashr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2261c217abccSJiong Wang {
2262c217abccSJiong Wang 	ashr_reg64_lt32_low(nfp_prog, dst, src);
2263c217abccSJiong Wang 	ashr_reg64_lt32_high(nfp_prog, dst, src);
2264c217abccSJiong Wang }
2265c217abccSJiong Wang 
2266c217abccSJiong Wang static void ashr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2267c217abccSJiong Wang {
2268c217abccSJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
2269c217abccSJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
2270c217abccSJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2271f43d0f17SJiong Wang 	emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2272f43d0f17SJiong Wang 		 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2273c217abccSJiong Wang }
2274c217abccSJiong Wang 
2275c217abccSJiong Wang /* Like ashr_imm64, but need to use indirect shift. */
2276c217abccSJiong Wang static int ashr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2277c217abccSJiong Wang {
2278c217abccSJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2279c217abccSJiong Wang 	u64 umin, umax;
2280c217abccSJiong Wang 	u8 dst, src;
2281c217abccSJiong Wang 
2282c217abccSJiong Wang 	dst = insn->dst_reg * 2;
2283662c5472SJiong Wang 	umin = meta->umin_src;
2284662c5472SJiong Wang 	umax = meta->umax_src;
2285c217abccSJiong Wang 	if (umin == umax)
2286c217abccSJiong Wang 		return __ashr_imm64(nfp_prog, dst, umin);
2287c217abccSJiong Wang 
2288c217abccSJiong Wang 	src = insn->src_reg * 2;
2289c217abccSJiong Wang 	if (umax < 32) {
2290c217abccSJiong Wang 		ashr_reg64_lt32(nfp_prog, dst, src);
2291c217abccSJiong Wang 	} else if (umin >= 32) {
2292c217abccSJiong Wang 		ashr_reg64_ge32(nfp_prog, dst, src);
2293c217abccSJiong Wang 	} else {
2294c217abccSJiong Wang 		u16 label_ge32, label_end;
2295c217abccSJiong Wang 
2296c217abccSJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
2297c217abccSJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2298c217abccSJiong Wang 		ashr_reg64_lt32_low(nfp_prog, dst, src);
2299c217abccSJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2300c217abccSJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2301c217abccSJiong Wang 		/* ashr_reg64_lt32_high packed in delay slot. */
2302c217abccSJiong Wang 		ashr_reg64_lt32_high(nfp_prog, dst, src);
2303c217abccSJiong Wang 
2304c217abccSJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2305c217abccSJiong Wang 			return -EINVAL;
2306c217abccSJiong Wang 		ashr_reg64_ge32(nfp_prog, dst, src);
2307c217abccSJiong Wang 
2308c217abccSJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2309c217abccSJiong Wang 			return -EINVAL;
2310f43d0f17SJiong Wang 	}
2311f43d0f17SJiong Wang 
2312f43d0f17SJiong Wang 	return 0;
2313f43d0f17SJiong Wang }
2314f43d0f17SJiong Wang 
2315d9ae7f2bSJakub Kicinski static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2316d9ae7f2bSJakub Kicinski {
2317d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2318d9ae7f2bSJakub Kicinski 
2319d9ae7f2bSJakub Kicinski 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2,  insn->src_reg * 2);
2320d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2321d9ae7f2bSJakub Kicinski 
2322d9ae7f2bSJakub Kicinski 	return 0;
2323d9ae7f2bSJakub Kicinski }
2324d9ae7f2bSJakub Kicinski 
2325d9ae7f2bSJakub Kicinski static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2326d9ae7f2bSJakub Kicinski {
2327d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2328d9ae7f2bSJakub Kicinski 
2329d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
2330d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2331d9ae7f2bSJakub Kicinski 
2332d9ae7f2bSJakub Kicinski 	return 0;
2333d9ae7f2bSJakub Kicinski }
2334d9ae7f2bSJakub Kicinski 
2335d9ae7f2bSJakub Kicinski static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2336d9ae7f2bSJakub Kicinski {
2337d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
2338d9ae7f2bSJakub Kicinski }
2339d9ae7f2bSJakub Kicinski 
2340d9ae7f2bSJakub Kicinski static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2341d9ae7f2bSJakub Kicinski {
2342d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm);
2343d9ae7f2bSJakub Kicinski }
2344d9ae7f2bSJakub Kicinski 
2345d9ae7f2bSJakub Kicinski static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2346d9ae7f2bSJakub Kicinski {
2347d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
2348d9ae7f2bSJakub Kicinski }
2349d9ae7f2bSJakub Kicinski 
2350d9ae7f2bSJakub Kicinski static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2351d9ae7f2bSJakub Kicinski {
2352d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
2353d9ae7f2bSJakub Kicinski }
2354d9ae7f2bSJakub Kicinski 
2355d9ae7f2bSJakub Kicinski static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2356d9ae7f2bSJakub Kicinski {
2357d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
2358d9ae7f2bSJakub Kicinski }
2359d9ae7f2bSJakub Kicinski 
2360d9ae7f2bSJakub Kicinski static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2361d9ae7f2bSJakub Kicinski {
2362d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
2363d9ae7f2bSJakub Kicinski }
2364d9ae7f2bSJakub Kicinski 
2365d9ae7f2bSJakub Kicinski static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2366d9ae7f2bSJakub Kicinski {
2367d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
2368d9ae7f2bSJakub Kicinski }
2369d9ae7f2bSJakub Kicinski 
2370d9ae7f2bSJakub Kicinski static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2371d9ae7f2bSJakub Kicinski {
2372d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm);
2373d9ae7f2bSJakub Kicinski }
2374d9ae7f2bSJakub Kicinski 
2375d9ae7f2bSJakub Kicinski static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2376d9ae7f2bSJakub Kicinski {
2377d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
2378d9ae7f2bSJakub Kicinski }
2379d9ae7f2bSJakub Kicinski 
2380d9ae7f2bSJakub Kicinski static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2381d9ae7f2bSJakub Kicinski {
2382d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm);
2383d9ae7f2bSJakub Kicinski }
2384d9ae7f2bSJakub Kicinski 
2385d3d23fdbSJiong Wang static int mul_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2386d3d23fdbSJiong Wang {
2387d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, false, true);
2388d3d23fdbSJiong Wang }
2389d3d23fdbSJiong Wang 
2390d3d23fdbSJiong Wang static int mul_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2391d3d23fdbSJiong Wang {
2392d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, false, false);
2393d3d23fdbSJiong Wang }
2394d3d23fdbSJiong Wang 
23952a952b03SJiong Wang static int div_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
23962a952b03SJiong Wang {
23972a952b03SJiong Wang 	return div_reg64(nfp_prog, meta);
23982a952b03SJiong Wang }
23992a952b03SJiong Wang 
24002a952b03SJiong Wang static int div_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
24012a952b03SJiong Wang {
24022a952b03SJiong Wang 	return div_imm64(nfp_prog, meta);
24032a952b03SJiong Wang }
24042a952b03SJiong Wang 
2405254ef4d7SJiong Wang static int neg_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2406254ef4d7SJiong Wang {
2407254ef4d7SJiong Wang 	u8 dst = meta->insn.dst_reg * 2;
2408254ef4d7SJiong Wang 
2409254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(dst), reg_imm(0), ALU_OP_SUB, reg_b(dst));
2410254ef4d7SJiong Wang 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2411254ef4d7SJiong Wang 
2412254ef4d7SJiong Wang 	return 0;
2413254ef4d7SJiong Wang }
2414254ef4d7SJiong Wang 
2415d9ae7f2bSJakub Kicinski static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2416d9ae7f2bSJakub Kicinski {
2417d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2418d9ae7f2bSJakub Kicinski 
2419d9ae7f2bSJakub Kicinski 	if (!insn->imm)
2420d9ae7f2bSJakub Kicinski 		return 1; /* TODO: zero shift means indirect */
2421d9ae7f2bSJakub Kicinski 
2422d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_both(insn->dst_reg * 2),
2423d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2),
2424d9ae7f2bSJakub Kicinski 		 SHF_SC_L_SHF, insn->imm);
2425d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2426d9ae7f2bSJakub Kicinski 
2427d9ae7f2bSJakub Kicinski 	return 0;
2428d9ae7f2bSJakub Kicinski }
2429d9ae7f2bSJakub Kicinski 
24303119d1fdSJakub Kicinski static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
24313119d1fdSJakub Kicinski {
24323119d1fdSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
24333119d1fdSJakub Kicinski 	u8 gpr = insn->dst_reg * 2;
24343119d1fdSJakub Kicinski 
24353119d1fdSJakub Kicinski 	switch (insn->imm) {
24363119d1fdSJakub Kicinski 	case 16:
24373119d1fdSJakub Kicinski 		emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr),
24383119d1fdSJakub Kicinski 			      SHF_SC_R_ROT, 8);
24393119d1fdSJakub Kicinski 		emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr),
24403119d1fdSJakub Kicinski 			      SHF_SC_R_SHF, 16);
24413119d1fdSJakub Kicinski 
24423119d1fdSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
24433119d1fdSJakub Kicinski 		break;
24443119d1fdSJakub Kicinski 	case 32:
24453119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, reg_a(gpr), gpr);
24463119d1fdSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
24473119d1fdSJakub Kicinski 		break;
24483119d1fdSJakub Kicinski 	case 64:
24493119d1fdSJakub Kicinski 		wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1));
24503119d1fdSJakub Kicinski 
24513119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, reg_a(gpr), gpr + 1);
24523119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, imm_a(nfp_prog), gpr);
24533119d1fdSJakub Kicinski 		break;
24543119d1fdSJakub Kicinski 	}
24553119d1fdSJakub Kicinski 
24563119d1fdSJakub Kicinski 	return 0;
24573119d1fdSJakub Kicinski }
24583119d1fdSJakub Kicinski 
2459d9ae7f2bSJakub Kicinski static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2460d9ae7f2bSJakub Kicinski {
24619f16c8abSJakub Kicinski 	struct nfp_insn_meta *prev = nfp_meta_prev(meta);
24629f16c8abSJakub Kicinski 	u32 imm_lo, imm_hi;
24639f16c8abSJakub Kicinski 	u8 dst;
24649f16c8abSJakub Kicinski 
24659f16c8abSJakub Kicinski 	dst = prev->insn.dst_reg * 2;
24669f16c8abSJakub Kicinski 	imm_lo = prev->insn.imm;
24679f16c8abSJakub Kicinski 	imm_hi = meta->insn.imm;
24689f16c8abSJakub Kicinski 
24699f16c8abSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst), imm_lo);
24709f16c8abSJakub Kicinski 
24719f16c8abSJakub Kicinski 	/* mov is always 1 insn, load imm may be two, so try to use mov */
24729f16c8abSJakub Kicinski 	if (imm_hi == imm_lo)
24739f16c8abSJakub Kicinski 		wrp_mov(nfp_prog, reg_both(dst + 1), reg_a(dst));
24749f16c8abSJakub Kicinski 	else
24759f16c8abSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst + 1), imm_hi);
2476d9ae7f2bSJakub Kicinski 
2477d9ae7f2bSJakub Kicinski 	return 0;
2478d9ae7f2bSJakub Kicinski }
2479d9ae7f2bSJakub Kicinski 
2480d9ae7f2bSJakub Kicinski static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2481d9ae7f2bSJakub Kicinski {
2482d9ae7f2bSJakub Kicinski 	meta->double_cb = imm_ld8_part2;
2483d9ae7f2bSJakub Kicinski 	return 0;
2484d9ae7f2bSJakub Kicinski }
2485d9ae7f2bSJakub Kicinski 
2486d9ae7f2bSJakub Kicinski static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2487d9ae7f2bSJakub Kicinski {
2488d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 1);
2489d9ae7f2bSJakub Kicinski }
2490d9ae7f2bSJakub Kicinski 
2491d9ae7f2bSJakub Kicinski static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2492d9ae7f2bSJakub Kicinski {
2493d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 2);
2494d9ae7f2bSJakub Kicinski }
2495d9ae7f2bSJakub Kicinski 
2496d9ae7f2bSJakub Kicinski static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2497d9ae7f2bSJakub Kicinski {
2498d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 4);
2499d9ae7f2bSJakub Kicinski }
2500d9ae7f2bSJakub Kicinski 
2501d9ae7f2bSJakub Kicinski static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2502d9ae7f2bSJakub Kicinski {
2503d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25040a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 1);
2505d9ae7f2bSJakub Kicinski }
2506d9ae7f2bSJakub Kicinski 
2507d9ae7f2bSJakub Kicinski static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2508d9ae7f2bSJakub Kicinski {
2509d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25100a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 2);
2511d9ae7f2bSJakub Kicinski }
2512d9ae7f2bSJakub Kicinski 
2513d9ae7f2bSJakub Kicinski static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2514d9ae7f2bSJakub Kicinski {
2515d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25160a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 4);
2517d9ae7f2bSJakub Kicinski }
2518d9ae7f2bSJakub Kicinski 
2519a82b23fbSJakub Kicinski static int
2520a82b23fbSJakub Kicinski mem_ldx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2521d3488480SJakub Kicinski 	      unsigned int size, unsigned int ptr_off)
2522a82b23fbSJakub Kicinski {
2523d3488480SJakub Kicinski 	return mem_op_stack(nfp_prog, meta, size, ptr_off,
2524b14157eeSJakub Kicinski 			    meta->insn.dst_reg * 2, meta->insn.src_reg * 2,
2525b14157eeSJakub Kicinski 			    true, wrp_lmem_load);
2526a82b23fbSJakub Kicinski }
2527a82b23fbSJakub Kicinski 
2528943c57b9SJakub Kicinski static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2529943c57b9SJakub Kicinski 		       u8 size)
2530d9ae7f2bSJakub Kicinski {
2531bfddbc8aSJakub Kicinski 	swreg dst = reg_both(meta->insn.dst_reg * 2);
2532bfddbc8aSJakub Kicinski 
2533943c57b9SJakub Kicinski 	switch (meta->insn.off) {
2534c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, len):
2535c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, len))
2536943c57b9SJakub Kicinski 			return -EOPNOTSUPP;
2537bfddbc8aSJakub Kicinski 		wrp_mov(nfp_prog, dst, plen_reg(nfp_prog));
2538bfddbc8aSJakub Kicinski 		break;
2539c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, data):
2540c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, data))
2541bfddbc8aSJakub Kicinski 			return -EOPNOTSUPP;
2542bfddbc8aSJakub Kicinski 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
2543bfddbc8aSJakub Kicinski 		break;
2544c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, data_end):
2545c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, data_end))
2546bfddbc8aSJakub Kicinski 			return -EOPNOTSUPP;
2547bfddbc8aSJakub Kicinski 		emit_alu(nfp_prog, dst,
2548bfddbc8aSJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
2549943c57b9SJakub Kicinski 		break;
2550943c57b9SJakub Kicinski 	default:
2551d9ae7f2bSJakub Kicinski 		return -EOPNOTSUPP;
2552943c57b9SJakub Kicinski 	}
2553943c57b9SJakub Kicinski 
2554943c57b9SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2555d9ae7f2bSJakub Kicinski 
2556d9ae7f2bSJakub Kicinski 	return 0;
2557d9ae7f2bSJakub Kicinski }
2558d9ae7f2bSJakub Kicinski 
2559943c57b9SJakub Kicinski static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2560943c57b9SJakub Kicinski 		       u8 size)
2561d9ae7f2bSJakub Kicinski {
2562b3f868dfSJakub Kicinski 	swreg dst = reg_both(meta->insn.dst_reg * 2);
2563d9ae7f2bSJakub Kicinski 
2564943c57b9SJakub Kicinski 	switch (meta->insn.off) {
2565c6c580d7SJakub Kicinski 	case offsetof(struct xdp_md, data):
2566c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct xdp_md, data))
2567c6c580d7SJakub Kicinski 			return -EOPNOTSUPP;
2568c000dfb5SJakub Kicinski 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
2569943c57b9SJakub Kicinski 		break;
2570c6c580d7SJakub Kicinski 	case offsetof(struct xdp_md, data_end):
2571c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct xdp_md, data_end))
2572c6c580d7SJakub Kicinski 			return -EOPNOTSUPP;
2573943c57b9SJakub Kicinski 		emit_alu(nfp_prog, dst,
2574943c57b9SJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
2575943c57b9SJakub Kicinski 		break;
2576943c57b9SJakub Kicinski 	default:
2577943c57b9SJakub Kicinski 		return -EOPNOTSUPP;
2578943c57b9SJakub Kicinski 	}
2579d9ae7f2bSJakub Kicinski 
2580943c57b9SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2581d9ae7f2bSJakub Kicinski 
2582d9ae7f2bSJakub Kicinski 	return 0;
2583d9ae7f2bSJakub Kicinski }
2584d9ae7f2bSJakub Kicinski 
25852ca71441SJakub Kicinski static int
25862ca71441SJakub Kicinski mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
25872ca71441SJakub Kicinski 	     unsigned int size)
25882ca71441SJakub Kicinski {
25892ca71441SJakub Kicinski 	swreg tmp_reg;
25902ca71441SJakub Kicinski 
25912ca71441SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
25922ca71441SJakub Kicinski 
25933dd43c33SJakub Kicinski 	return data_ld_host_order_addr32(nfp_prog, meta->insn.src_reg * 2,
25943dd43c33SJakub Kicinski 					 tmp_reg, meta->insn.dst_reg * 2, size);
25953dd43c33SJakub Kicinski }
25963dd43c33SJakub Kicinski 
25973dd43c33SJakub Kicinski static int
25983dd43c33SJakub Kicinski mem_ldx_emem(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
25993dd43c33SJakub Kicinski 	     unsigned int size)
26003dd43c33SJakub Kicinski {
26013dd43c33SJakub Kicinski 	swreg tmp_reg;
26023dd43c33SJakub Kicinski 
26033dd43c33SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
26043dd43c33SJakub Kicinski 
26053dd43c33SJakub Kicinski 	return data_ld_host_order_addr40(nfp_prog, meta->insn.src_reg * 2,
26063dd43c33SJakub Kicinski 					 tmp_reg, meta->insn.dst_reg * 2, size);
26072ca71441SJakub Kicinski }
26082ca71441SJakub Kicinski 
2609be759237SJiong Wang static void
2610be759237SJiong Wang mem_ldx_data_init_pktcache(struct nfp_prog *nfp_prog,
2611be759237SJiong Wang 			   struct nfp_insn_meta *meta)
2612be759237SJiong Wang {
2613be759237SJiong Wang 	s16 range_start = meta->pkt_cache.range_start;
2614be759237SJiong Wang 	s16 range_end = meta->pkt_cache.range_end;
2615be759237SJiong Wang 	swreg src_base, off;
2616be759237SJiong Wang 	u8 xfer_num, len;
2617be759237SJiong Wang 	bool indir;
2618be759237SJiong Wang 
2619be759237SJiong Wang 	off = re_load_imm_any(nfp_prog, range_start, imm_b(nfp_prog));
2620be759237SJiong Wang 	src_base = reg_a(meta->insn.src_reg * 2);
2621be759237SJiong Wang 	len = range_end - range_start;
2622be759237SJiong Wang 	xfer_num = round_up(len, REG_WIDTH) / REG_WIDTH;
2623be759237SJiong Wang 
2624be759237SJiong Wang 	indir = len > 8 * REG_WIDTH;
2625be759237SJiong Wang 	/* Setup PREV_ALU for indirect mode. */
2626be759237SJiong Wang 	if (indir)
2627be759237SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
2628be759237SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
2629be759237SJiong Wang 
2630be759237SJiong Wang 	/* Cache memory into transfer-in registers. */
2631be759237SJiong Wang 	emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0, src_base,
2632b556ddd9SJakub Kicinski 		     off, xfer_num - 1, CMD_CTX_SWAP, indir);
2633be759237SJiong Wang }
2634be759237SJiong Wang 
2635be759237SJiong Wang static int
263691ff69e8SJiong Wang mem_ldx_data_from_pktcache_unaligned(struct nfp_prog *nfp_prog,
263791ff69e8SJiong Wang 				     struct nfp_insn_meta *meta,
263891ff69e8SJiong Wang 				     unsigned int size)
263991ff69e8SJiong Wang {
264091ff69e8SJiong Wang 	s16 range_start = meta->pkt_cache.range_start;
264191ff69e8SJiong Wang 	s16 insn_off = meta->insn.off - range_start;
264291ff69e8SJiong Wang 	swreg dst_lo, dst_hi, src_lo, src_mid;
264391ff69e8SJiong Wang 	u8 dst_gpr = meta->insn.dst_reg * 2;
264491ff69e8SJiong Wang 	u8 len_lo = size, len_mid = 0;
264591ff69e8SJiong Wang 	u8 idx = insn_off / REG_WIDTH;
264691ff69e8SJiong Wang 	u8 off = insn_off % REG_WIDTH;
264791ff69e8SJiong Wang 
264891ff69e8SJiong Wang 	dst_hi = reg_both(dst_gpr + 1);
264991ff69e8SJiong Wang 	dst_lo = reg_both(dst_gpr);
265091ff69e8SJiong Wang 	src_lo = reg_xfer(idx);
265191ff69e8SJiong Wang 
265291ff69e8SJiong Wang 	/* The read length could involve as many as three registers. */
265391ff69e8SJiong Wang 	if (size > REG_WIDTH - off) {
265491ff69e8SJiong Wang 		/* Calculate the part in the second register. */
265591ff69e8SJiong Wang 		len_lo = REG_WIDTH - off;
265691ff69e8SJiong Wang 		len_mid = size - len_lo;
265791ff69e8SJiong Wang 
265891ff69e8SJiong Wang 		/* Calculate the part in the third register. */
265991ff69e8SJiong Wang 		if (size > 2 * REG_WIDTH - off)
266091ff69e8SJiong Wang 			len_mid = REG_WIDTH;
266191ff69e8SJiong Wang 	}
266291ff69e8SJiong Wang 
266391ff69e8SJiong Wang 	wrp_reg_subpart(nfp_prog, dst_lo, src_lo, len_lo, off);
266491ff69e8SJiong Wang 
266591ff69e8SJiong Wang 	if (!len_mid) {
266691ff69e8SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
266791ff69e8SJiong Wang 		return 0;
266891ff69e8SJiong Wang 	}
266991ff69e8SJiong Wang 
267091ff69e8SJiong Wang 	src_mid = reg_xfer(idx + 1);
267191ff69e8SJiong Wang 
267291ff69e8SJiong Wang 	if (size <= REG_WIDTH) {
267391ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid, len_mid, len_lo);
267491ff69e8SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
267591ff69e8SJiong Wang 	} else {
267691ff69e8SJiong Wang 		swreg src_hi = reg_xfer(idx + 2);
267791ff69e8SJiong Wang 
267891ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid,
267991ff69e8SJiong Wang 				   REG_WIDTH - len_lo, len_lo);
268091ff69e8SJiong Wang 		wrp_reg_subpart(nfp_prog, dst_hi, src_mid, len_lo,
268191ff69e8SJiong Wang 				REG_WIDTH - len_lo);
268291ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_hi, src_hi, REG_WIDTH - len_lo,
268391ff69e8SJiong Wang 				   len_lo);
268491ff69e8SJiong Wang 	}
268591ff69e8SJiong Wang 
268691ff69e8SJiong Wang 	return 0;
268791ff69e8SJiong Wang }
268891ff69e8SJiong Wang 
268991ff69e8SJiong Wang static int
2690be759237SJiong Wang mem_ldx_data_from_pktcache_aligned(struct nfp_prog *nfp_prog,
2691be759237SJiong Wang 				   struct nfp_insn_meta *meta,
2692be759237SJiong Wang 				   unsigned int size)
2693be759237SJiong Wang {
2694be759237SJiong Wang 	swreg dst_lo, dst_hi, src_lo;
2695be759237SJiong Wang 	u8 dst_gpr, idx;
2696be759237SJiong Wang 
2697be759237SJiong Wang 	idx = (meta->insn.off - meta->pkt_cache.range_start) / REG_WIDTH;
2698be759237SJiong Wang 	dst_gpr = meta->insn.dst_reg * 2;
2699be759237SJiong Wang 	dst_hi = reg_both(dst_gpr + 1);
2700be759237SJiong Wang 	dst_lo = reg_both(dst_gpr);
2701be759237SJiong Wang 	src_lo = reg_xfer(idx);
2702be759237SJiong Wang 
2703be759237SJiong Wang 	if (size < REG_WIDTH) {
2704be759237SJiong Wang 		wrp_reg_subpart(nfp_prog, dst_lo, src_lo, size, 0);
2705be759237SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
2706be759237SJiong Wang 	} else if (size == REG_WIDTH) {
2707be759237SJiong Wang 		wrp_mov(nfp_prog, dst_lo, src_lo);
2708be759237SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
2709be759237SJiong Wang 	} else {
2710be759237SJiong Wang 		swreg src_hi = reg_xfer(idx + 1);
2711be759237SJiong Wang 
2712be759237SJiong Wang 		wrp_mov(nfp_prog, dst_lo, src_lo);
2713be759237SJiong Wang 		wrp_mov(nfp_prog, dst_hi, src_hi);
2714be759237SJiong Wang 	}
2715be759237SJiong Wang 
2716be759237SJiong Wang 	return 0;
2717be759237SJiong Wang }
2718be759237SJiong Wang 
2719be759237SJiong Wang static int
2720be759237SJiong Wang mem_ldx_data_from_pktcache(struct nfp_prog *nfp_prog,
2721be759237SJiong Wang 			   struct nfp_insn_meta *meta, unsigned int size)
2722be759237SJiong Wang {
2723be759237SJiong Wang 	u8 off = meta->insn.off - meta->pkt_cache.range_start;
2724be759237SJiong Wang 
272591ff69e8SJiong Wang 	if (IS_ALIGNED(off, REG_WIDTH))
2726be759237SJiong Wang 		return mem_ldx_data_from_pktcache_aligned(nfp_prog, meta, size);
272791ff69e8SJiong Wang 
272891ff69e8SJiong Wang 	return mem_ldx_data_from_pktcache_unaligned(nfp_prog, meta, size);
2729be759237SJiong Wang }
2730be759237SJiong Wang 
27312ca71441SJakub Kicinski static int
27322ca71441SJakub Kicinski mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
27332ca71441SJakub Kicinski 	unsigned int size)
27342ca71441SJakub Kicinski {
27359879a381SJiong Wang 	if (meta->ldst_gather_len)
27369879a381SJiong Wang 		return nfp_cpp_memcpy(nfp_prog, meta);
27379879a381SJiong Wang 
27382ca71441SJakub Kicinski 	if (meta->ptr.type == PTR_TO_CTX) {
2739012bb8a8SJakub Kicinski 		if (nfp_prog->type == BPF_PROG_TYPE_XDP)
27402ca71441SJakub Kicinski 			return mem_ldx_xdp(nfp_prog, meta, size);
27412ca71441SJakub Kicinski 		else
27422ca71441SJakub Kicinski 			return mem_ldx_skb(nfp_prog, meta, size);
27432ca71441SJakub Kicinski 	}
27442ca71441SJakub Kicinski 
2745be759237SJiong Wang 	if (meta->ptr.type == PTR_TO_PACKET) {
2746be759237SJiong Wang 		if (meta->pkt_cache.range_end) {
2747be759237SJiong Wang 			if (meta->pkt_cache.do_init)
2748be759237SJiong Wang 				mem_ldx_data_init_pktcache(nfp_prog, meta);
2749be759237SJiong Wang 
2750be759237SJiong Wang 			return mem_ldx_data_from_pktcache(nfp_prog, meta, size);
2751be759237SJiong Wang 		} else {
27522ca71441SJakub Kicinski 			return mem_ldx_data(nfp_prog, meta, size);
2753be759237SJiong Wang 		}
2754be759237SJiong Wang 	}
27552ca71441SJakub Kicinski 
2756a82b23fbSJakub Kicinski 	if (meta->ptr.type == PTR_TO_STACK)
2757d3488480SJakub Kicinski 		return mem_ldx_stack(nfp_prog, meta, size,
2758d3488480SJakub Kicinski 				     meta->ptr.off + meta->ptr.var_off.value);
2759a82b23fbSJakub Kicinski 
27603dd43c33SJakub Kicinski 	if (meta->ptr.type == PTR_TO_MAP_VALUE)
27613dd43c33SJakub Kicinski 		return mem_ldx_emem(nfp_prog, meta, size);
27623dd43c33SJakub Kicinski 
27632ca71441SJakub Kicinski 	return -EOPNOTSUPP;
27642ca71441SJakub Kicinski }
27652ca71441SJakub Kicinski 
27662ca71441SJakub Kicinski static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27672ca71441SJakub Kicinski {
27682ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 1);
27692ca71441SJakub Kicinski }
27702ca71441SJakub Kicinski 
27712ca71441SJakub Kicinski static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27722ca71441SJakub Kicinski {
27732ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 2);
27742ca71441SJakub Kicinski }
27752ca71441SJakub Kicinski 
2776d9ae7f2bSJakub Kicinski static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2777d9ae7f2bSJakub Kicinski {
27782ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 4);
27792ca71441SJakub Kicinski }
27802ca71441SJakub Kicinski 
27812ca71441SJakub Kicinski static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27822ca71441SJakub Kicinski {
27832ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 8);
2784d9ae7f2bSJakub Kicinski }
2785d9ae7f2bSJakub Kicinski 
2786e663fe38SJakub Kicinski static int
2787e663fe38SJakub Kicinski mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2788e663fe38SJakub Kicinski 	    unsigned int size)
2789d9ae7f2bSJakub Kicinski {
2790e663fe38SJakub Kicinski 	u64 imm = meta->insn.imm; /* sign extend */
2791e663fe38SJakub Kicinski 	swreg off_reg;
2792e663fe38SJakub Kicinski 
2793e663fe38SJakub Kicinski 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2794e663fe38SJakub Kicinski 
2795e663fe38SJakub Kicinski 	return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
2796e663fe38SJakub Kicinski 				  imm, size);
2797e663fe38SJakub Kicinski }
2798e663fe38SJakub Kicinski 
2799e663fe38SJakub Kicinski static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2800e663fe38SJakub Kicinski 		  unsigned int size)
2801e663fe38SJakub Kicinski {
2802e663fe38SJakub Kicinski 	if (meta->ptr.type == PTR_TO_PACKET)
2803e663fe38SJakub Kicinski 		return mem_st_data(nfp_prog, meta, size);
2804e663fe38SJakub Kicinski 
2805d9ae7f2bSJakub Kicinski 	return -EOPNOTSUPP;
2806d9ae7f2bSJakub Kicinski }
2807d9ae7f2bSJakub Kicinski 
2808e663fe38SJakub Kicinski static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2809d9ae7f2bSJakub Kicinski {
2810e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 1);
2811e663fe38SJakub Kicinski }
2812e663fe38SJakub Kicinski 
2813e663fe38SJakub Kicinski static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2814e663fe38SJakub Kicinski {
2815e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 2);
2816e663fe38SJakub Kicinski }
2817e663fe38SJakub Kicinski 
2818e663fe38SJakub Kicinski static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2819e663fe38SJakub Kicinski {
2820e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 4);
2821e663fe38SJakub Kicinski }
2822e663fe38SJakub Kicinski 
2823e663fe38SJakub Kicinski static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2824e663fe38SJakub Kicinski {
2825e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 8);
2826e663fe38SJakub Kicinski }
2827e663fe38SJakub Kicinski 
2828e663fe38SJakub Kicinski static int
2829e663fe38SJakub Kicinski mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2830e663fe38SJakub Kicinski 	     unsigned int size)
2831e663fe38SJakub Kicinski {
2832e663fe38SJakub Kicinski 	swreg off_reg;
2833e663fe38SJakub Kicinski 
2834e663fe38SJakub Kicinski 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2835e663fe38SJakub Kicinski 
2836e663fe38SJakub Kicinski 	return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
2837e663fe38SJakub Kicinski 				   meta->insn.src_reg * 2, size);
2838e663fe38SJakub Kicinski }
2839e663fe38SJakub Kicinski 
2840e663fe38SJakub Kicinski static int
2841ee9133a8SJakub Kicinski mem_stx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2842d3488480SJakub Kicinski 	      unsigned int size, unsigned int ptr_off)
2843ee9133a8SJakub Kicinski {
2844d3488480SJakub Kicinski 	return mem_op_stack(nfp_prog, meta, size, ptr_off,
2845b14157eeSJakub Kicinski 			    meta->insn.src_reg * 2, meta->insn.dst_reg * 2,
2846b14157eeSJakub Kicinski 			    false, wrp_lmem_store);
2847ee9133a8SJakub Kicinski }
2848ee9133a8SJakub Kicinski 
2849d985888fSJakub Kicinski static int mem_stx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2850d985888fSJakub Kicinski {
2851d985888fSJakub Kicinski 	switch (meta->insn.off) {
2852d985888fSJakub Kicinski 	case offsetof(struct xdp_md, rx_queue_index):
2853d985888fSJakub Kicinski 		return nfp_queue_select(nfp_prog, meta);
2854d985888fSJakub Kicinski 	}
2855d985888fSJakub Kicinski 
2856d985888fSJakub Kicinski 	WARN_ON_ONCE(1); /* verifier should have rejected bad accesses */
2857d985888fSJakub Kicinski 	return -EOPNOTSUPP;
2858d985888fSJakub Kicinski }
2859d985888fSJakub Kicinski 
2860ee9133a8SJakub Kicinski static int
2861e663fe38SJakub Kicinski mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2862e663fe38SJakub Kicinski 	unsigned int size)
2863e663fe38SJakub Kicinski {
2864e663fe38SJakub Kicinski 	if (meta->ptr.type == PTR_TO_PACKET)
2865e663fe38SJakub Kicinski 		return mem_stx_data(nfp_prog, meta, size);
2866e663fe38SJakub Kicinski 
2867ee9133a8SJakub Kicinski 	if (meta->ptr.type == PTR_TO_STACK)
2868d3488480SJakub Kicinski 		return mem_stx_stack(nfp_prog, meta, size,
2869d3488480SJakub Kicinski 				     meta->ptr.off + meta->ptr.var_off.value);
2870ee9133a8SJakub Kicinski 
2871d9ae7f2bSJakub Kicinski 	return -EOPNOTSUPP;
2872d9ae7f2bSJakub Kicinski }
2873d9ae7f2bSJakub Kicinski 
2874e663fe38SJakub Kicinski static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2875e663fe38SJakub Kicinski {
2876e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 1);
2877e663fe38SJakub Kicinski }
2878e663fe38SJakub Kicinski 
2879e663fe38SJakub Kicinski static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2880e663fe38SJakub Kicinski {
2881e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 2);
2882e663fe38SJakub Kicinski }
2883e663fe38SJakub Kicinski 
2884d9ae7f2bSJakub Kicinski static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2885d9ae7f2bSJakub Kicinski {
2886d985888fSJakub Kicinski 	if (meta->ptr.type == PTR_TO_CTX)
2887d985888fSJakub Kicinski 		if (nfp_prog->type == BPF_PROG_TYPE_XDP)
2888d985888fSJakub Kicinski 			return mem_stx_xdp(nfp_prog, meta);
2889e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 4);
2890e663fe38SJakub Kicinski }
28912ca71441SJakub Kicinski 
2892e663fe38SJakub Kicinski static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2893e663fe38SJakub Kicinski {
2894e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 8);
2895d9ae7f2bSJakub Kicinski }
2896d9ae7f2bSJakub Kicinski 
2897dcb0c27fSJakub Kicinski static int
2898dcb0c27fSJakub Kicinski mem_xadd(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, bool is64)
2899dcb0c27fSJakub Kicinski {
2900dcb0c27fSJakub Kicinski 	u8 dst_gpr = meta->insn.dst_reg * 2;
2901dcb0c27fSJakub Kicinski 	u8 src_gpr = meta->insn.src_reg * 2;
290241aed09cSJakub Kicinski 	unsigned int full_add, out;
290341aed09cSJakub Kicinski 	swreg addra, addrb, off;
2904dcb0c27fSJakub Kicinski 
2905dcb0c27fSJakub Kicinski 	off = ur_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2906dcb0c27fSJakub Kicinski 
290741aed09cSJakub Kicinski 	/* We can fit 16 bits into command immediate, if we know the immediate
290841aed09cSJakub Kicinski 	 * is guaranteed to either always or never fit into 16 bit we only
290941aed09cSJakub Kicinski 	 * generate code to handle that particular case, otherwise generate
291041aed09cSJakub Kicinski 	 * code for both.
291141aed09cSJakub Kicinski 	 */
291241aed09cSJakub Kicinski 	out = nfp_prog_current_offset(nfp_prog);
291341aed09cSJakub Kicinski 	full_add = nfp_prog_current_offset(nfp_prog);
291441aed09cSJakub Kicinski 
291541aed09cSJakub Kicinski 	if (meta->insn.off) {
291641aed09cSJakub Kicinski 		out += 2;
291741aed09cSJakub Kicinski 		full_add += 2;
291841aed09cSJakub Kicinski 	}
291941aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit) {
292041aed09cSJakub Kicinski 		out += 3;
292141aed09cSJakub Kicinski 		full_add += 3;
292241aed09cSJakub Kicinski 	}
292341aed09cSJakub Kicinski 	if (meta->xadd_over_16bit)
292441aed09cSJakub Kicinski 		out += 2 + is64;
292541aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
292641aed09cSJakub Kicinski 		out += 5;
292741aed09cSJakub Kicinski 		full_add += 5;
292841aed09cSJakub Kicinski 	}
292941aed09cSJakub Kicinski 
293041aed09cSJakub Kicinski 	/* Generate the branch for choosing add_imm vs add */
293141aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
293241aed09cSJakub Kicinski 		swreg max_imm = imm_a(nfp_prog);
293341aed09cSJakub Kicinski 
293441aed09cSJakub Kicinski 		wrp_immed(nfp_prog, max_imm, 0xffff);
293541aed09cSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
293641aed09cSJakub Kicinski 			 max_imm, ALU_OP_SUB, reg_b(src_gpr));
293741aed09cSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
293841aed09cSJakub Kicinski 			 reg_imm(0), ALU_OP_SUB_C, reg_b(src_gpr + 1));
293941aed09cSJakub Kicinski 		emit_br(nfp_prog, BR_BLO, full_add, meta->insn.off ? 2 : 0);
294041aed09cSJakub Kicinski 		/* defer for add */
294141aed09cSJakub Kicinski 	}
294241aed09cSJakub Kicinski 
2943dcb0c27fSJakub Kicinski 	/* If insn has an offset add to the address */
2944dcb0c27fSJakub Kicinski 	if (!meta->insn.off) {
2945dcb0c27fSJakub Kicinski 		addra = reg_a(dst_gpr);
2946dcb0c27fSJakub Kicinski 		addrb = reg_b(dst_gpr + 1);
2947dcb0c27fSJakub Kicinski 	} else {
2948dcb0c27fSJakub Kicinski 		emit_alu(nfp_prog, imma_a(nfp_prog),
2949dcb0c27fSJakub Kicinski 			 reg_a(dst_gpr), ALU_OP_ADD, off);
2950dcb0c27fSJakub Kicinski 		emit_alu(nfp_prog, imma_b(nfp_prog),
2951dcb0c27fSJakub Kicinski 			 reg_a(dst_gpr + 1), ALU_OP_ADD_C, reg_imm(0));
2952dcb0c27fSJakub Kicinski 		addra = imma_a(nfp_prog);
2953dcb0c27fSJakub Kicinski 		addrb = imma_b(nfp_prog);
2954dcb0c27fSJakub Kicinski 	}
2955dcb0c27fSJakub Kicinski 
295641aed09cSJakub Kicinski 	/* Generate the add_imm if 16 bits are possible */
295741aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit) {
295841aed09cSJakub Kicinski 		swreg prev_alu = imm_a(nfp_prog);
295941aed09cSJakub Kicinski 
2960dcb0c27fSJakub Kicinski 		wrp_immed(nfp_prog, prev_alu,
2961dcb0c27fSJakub Kicinski 			  FIELD_PREP(CMD_OVE_DATA, 2) |
2962dcb0c27fSJakub Kicinski 			  CMD_OVE_LEN |
2963dcb0c27fSJakub Kicinski 			  FIELD_PREP(CMD_OV_LEN, 0x8 | is64 << 2));
2964dcb0c27fSJakub Kicinski 		wrp_reg_or_subpart(nfp_prog, prev_alu, reg_b(src_gpr), 2, 2);
2965dcb0c27fSJakub Kicinski 		emit_cmd_indir(nfp_prog, CMD_TGT_ADD_IMM, CMD_MODE_40b_BA, 0,
2966b556ddd9SJakub Kicinski 			       addra, addrb, 0, CMD_CTX_NO_SWAP);
2967dcb0c27fSJakub Kicinski 
296841aed09cSJakub Kicinski 		if (meta->xadd_over_16bit)
296941aed09cSJakub Kicinski 			emit_br(nfp_prog, BR_UNC, out, 0);
297041aed09cSJakub Kicinski 	}
297141aed09cSJakub Kicinski 
297241aed09cSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, full_add))
297341aed09cSJakub Kicinski 		return -EINVAL;
297441aed09cSJakub Kicinski 
297541aed09cSJakub Kicinski 	/* Generate the add if 16 bits are not guaranteed */
297641aed09cSJakub Kicinski 	if (meta->xadd_over_16bit) {
297741aed09cSJakub Kicinski 		emit_cmd(nfp_prog, CMD_TGT_ADD, CMD_MODE_40b_BA, 0,
297841aed09cSJakub Kicinski 			 addra, addrb, is64 << 2,
297941aed09cSJakub Kicinski 			 is64 ? CMD_CTX_SWAP_DEFER2 : CMD_CTX_SWAP_DEFER1);
298041aed09cSJakub Kicinski 
298141aed09cSJakub Kicinski 		wrp_mov(nfp_prog, reg_xfer(0), reg_a(src_gpr));
298241aed09cSJakub Kicinski 		if (is64)
298341aed09cSJakub Kicinski 			wrp_mov(nfp_prog, reg_xfer(1), reg_a(src_gpr + 1));
298441aed09cSJakub Kicinski 	}
298541aed09cSJakub Kicinski 
298641aed09cSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, out))
298741aed09cSJakub Kicinski 		return -EINVAL;
298841aed09cSJakub Kicinski 
2989dcb0c27fSJakub Kicinski 	return 0;
2990dcb0c27fSJakub Kicinski }
2991dcb0c27fSJakub Kicinski 
2992dcb0c27fSJakub Kicinski static int mem_xadd4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2993dcb0c27fSJakub Kicinski {
2994dcb0c27fSJakub Kicinski 	return mem_xadd(nfp_prog, meta, false);
2995dcb0c27fSJakub Kicinski }
2996dcb0c27fSJakub Kicinski 
2997dcb0c27fSJakub Kicinski static int mem_xadd8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2998dcb0c27fSJakub Kicinski {
2999dcb0c27fSJakub Kicinski 	return mem_xadd(nfp_prog, meta, true);
3000dcb0c27fSJakub Kicinski }
3001dcb0c27fSJakub Kicinski 
3002d9ae7f2bSJakub Kicinski static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3003d9ae7f2bSJakub Kicinski {
3004d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
3005d9ae7f2bSJakub Kicinski 
3006d9ae7f2bSJakub Kicinski 	return 0;
3007d9ae7f2bSJakub Kicinski }
3008d9ae7f2bSJakub Kicinski 
3009d9ae7f2bSJakub Kicinski static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3010d9ae7f2bSJakub Kicinski {
3011d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3012d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3013b3f868dfSJakub Kicinski 	swreg or1, or2, tmp_reg;
3014b3f868dfSJakub Kicinski 
3015b3f868dfSJakub Kicinski 	or1 = reg_a(insn->dst_reg * 2);
3016b3f868dfSJakub Kicinski 	or2 = reg_b(insn->dst_reg * 2 + 1);
3017d9ae7f2bSJakub Kicinski 
3018d9ae7f2bSJakub Kicinski 	if (imm & ~0U) {
3019d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3020d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, imm_a(nfp_prog),
3021d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
3022d9ae7f2bSJakub Kicinski 		or1 = imm_a(nfp_prog);
3023d9ae7f2bSJakub Kicinski 	}
3024d9ae7f2bSJakub Kicinski 
3025d9ae7f2bSJakub Kicinski 	if (imm >> 32) {
3026d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3027d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
3028d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
3029d9ae7f2bSJakub Kicinski 		or2 = imm_b(nfp_prog);
3030d9ae7f2bSJakub Kicinski 	}
3031d9ae7f2bSJakub Kicinski 
3032d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
3033d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
3034d9ae7f2bSJakub Kicinski 
3035d9ae7f2bSJakub Kicinski 	return 0;
3036d9ae7f2bSJakub Kicinski }
3037d9ae7f2bSJakub Kicinski 
3038d9ae7f2bSJakub Kicinski static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3039d9ae7f2bSJakub Kicinski {
3040d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3041d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3042b3f868dfSJakub Kicinski 	swreg tmp_reg;
3043d9ae7f2bSJakub Kicinski 
3044d9ae7f2bSJakub Kicinski 	if (!imm) {
3045d9ae7f2bSJakub Kicinski 		meta->skip = true;
3046d9ae7f2bSJakub Kicinski 		return 0;
3047d9ae7f2bSJakub Kicinski 	}
3048d9ae7f2bSJakub Kicinski 
3049d9ae7f2bSJakub Kicinski 	if (imm & ~0U) {
3050d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3051d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
3052d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg);
3053d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
3054d9ae7f2bSJakub Kicinski 	}
3055d9ae7f2bSJakub Kicinski 
3056d9ae7f2bSJakub Kicinski 	if (imm >> 32) {
3057d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3058d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
3059d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg);
3060d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
3061d9ae7f2bSJakub Kicinski 	}
3062d9ae7f2bSJakub Kicinski 
3063d9ae7f2bSJakub Kicinski 	return 0;
3064d9ae7f2bSJakub Kicinski }
3065d9ae7f2bSJakub Kicinski 
3066d9ae7f2bSJakub Kicinski static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3067d9ae7f2bSJakub Kicinski {
3068d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3069d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3070b3f868dfSJakub Kicinski 	swreg tmp_reg;
3071d9ae7f2bSJakub Kicinski 
3072d9ae7f2bSJakub Kicinski 	if (!imm) {
3073d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
3074d9ae7f2bSJakub Kicinski 			 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
3075d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
307682837370SJakub Kicinski 		return 0;
3077d9ae7f2bSJakub Kicinski 	}
3078d9ae7f2bSJakub Kicinski 
3079d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3080d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3081d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
3082d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
3083d9ae7f2bSJakub Kicinski 
3084d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3085d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3086d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
3087d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
3088d9ae7f2bSJakub Kicinski 
3089d9ae7f2bSJakub Kicinski 	return 0;
3090d9ae7f2bSJakub Kicinski }
3091d9ae7f2bSJakub Kicinski 
3092d9ae7f2bSJakub Kicinski static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3093d9ae7f2bSJakub Kicinski {
3094d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3095d9ae7f2bSJakub Kicinski 
3096d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
3097d9ae7f2bSJakub Kicinski 		 ALU_OP_XOR, reg_b(insn->src_reg * 2));
3098d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1),
3099d9ae7f2bSJakub Kicinski 		 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1));
3100d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3101d9ae7f2bSJakub Kicinski 		 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog));
3102d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
3103d9ae7f2bSJakub Kicinski 
3104d9ae7f2bSJakub Kicinski 	return 0;
3105d9ae7f2bSJakub Kicinski }
3106d9ae7f2bSJakub Kicinski 
3107d9ae7f2bSJakub Kicinski static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3108d9ae7f2bSJakub Kicinski {
3109d9ae7f2bSJakub Kicinski 	return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
3110d9ae7f2bSJakub Kicinski }
3111d9ae7f2bSJakub Kicinski 
3112d9ae7f2bSJakub Kicinski static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3113d9ae7f2bSJakub Kicinski {
3114d9ae7f2bSJakub Kicinski 	return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
3115d9ae7f2bSJakub Kicinski }
3116d9ae7f2bSJakub Kicinski 
3117389f263bSQuentin Monnet static int
3118389f263bSQuentin Monnet bpf_to_bpf_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3119389f263bSQuentin Monnet {
3120bdf4c66fSQuentin Monnet 	u32 ret_tgt, stack_depth, offset_br;
3121389f263bSQuentin Monnet 	swreg tmp_reg;
3122389f263bSQuentin Monnet 
3123389f263bSQuentin Monnet 	stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN);
3124389f263bSQuentin Monnet 	/* Space for saving the return address is accounted for by the callee,
3125389f263bSQuentin Monnet 	 * so stack_depth can be zero for the main function.
3126389f263bSQuentin Monnet 	 */
3127389f263bSQuentin Monnet 	if (stack_depth) {
3128389f263bSQuentin Monnet 		tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
3129389f263bSQuentin Monnet 					  stack_imm(nfp_prog));
3130389f263bSQuentin Monnet 		emit_alu(nfp_prog, stack_reg(nfp_prog),
3131389f263bSQuentin Monnet 			 stack_reg(nfp_prog), ALU_OP_ADD, tmp_reg);
3132389f263bSQuentin Monnet 		emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
3133389f263bSQuentin Monnet 			    NFP_CSR_ACT_LM_ADDR0);
3134389f263bSQuentin Monnet 	}
3135389f263bSQuentin Monnet 
313644549623SQuentin Monnet 	/* Two cases for jumping to the callee:
313744549623SQuentin Monnet 	 *
313844549623SQuentin Monnet 	 * - If callee uses and needs to save R6~R9 then:
3139389f263bSQuentin Monnet 	 *     1. Put the start offset of the callee into imm_b(). This will
3140389f263bSQuentin Monnet 	 *        require a fixup step, as we do not necessarily know this
3141389f263bSQuentin Monnet 	 *        address yet.
3142389f263bSQuentin Monnet 	 *     2. Put the return address from the callee to the caller into
3143389f263bSQuentin Monnet 	 *        register ret_reg().
3144389f263bSQuentin Monnet 	 *     3. (After defer slots are consumed) Jump to the subroutine that
3145389f263bSQuentin Monnet 	 *        pushes the registers to the stack.
3146389f263bSQuentin Monnet 	 *   The subroutine acts as a trampoline, and returns to the address in
3147389f263bSQuentin Monnet 	 *   imm_b(), i.e. jumps to the callee.
3148389f263bSQuentin Monnet 	 *
314944549623SQuentin Monnet 	 * - If callee does not need to save R6~R9 then just load return
315044549623SQuentin Monnet 	 *   address to the caller in ret_reg(), and jump to the callee
315144549623SQuentin Monnet 	 *   directly.
315244549623SQuentin Monnet 	 *
3153389f263bSQuentin Monnet 	 * Using ret_reg() to pass the return address to the callee is set here
3154389f263bSQuentin Monnet 	 * as a convention. The callee can then push this address onto its
3155389f263bSQuentin Monnet 	 * stack frame in its prologue. The advantages of passing the return
3156389f263bSQuentin Monnet 	 * address through ret_reg(), instead of pushing it to the stack right
3157389f263bSQuentin Monnet 	 * here, are the following:
3158389f263bSQuentin Monnet 	 * - It looks cleaner.
3159389f263bSQuentin Monnet 	 * - If the called function is called multiple time, we get a lower
3160389f263bSQuentin Monnet 	 *   program size.
3161389f263bSQuentin Monnet 	 * - We save two no-op instructions that should be added just before
3162389f263bSQuentin Monnet 	 *   the emit_br() when stack depth is not null otherwise.
3163389f263bSQuentin Monnet 	 * - If we ever find a register to hold the return address during whole
3164389f263bSQuentin Monnet 	 *   execution of the callee, we will not have to push the return
3165389f263bSQuentin Monnet 	 *   address to the stack for leaf functions.
3166389f263bSQuentin Monnet 	 */
316744549623SQuentin Monnet 	if (!meta->jmp_dst) {
316844549623SQuentin Monnet 		pr_err("BUG: BPF-to-BPF call has no destination recorded\n");
316944549623SQuentin Monnet 		return -ELOOP;
317044549623SQuentin Monnet 	}
317144549623SQuentin Monnet 	if (nfp_prog->subprog[meta->jmp_dst->subprog_idx].needs_reg_push) {
3172389f263bSQuentin Monnet 		ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
3173389f263bSQuentin Monnet 		emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2,
3174389f263bSQuentin Monnet 			     RELO_BR_GO_CALL_PUSH_REGS);
3175bdf4c66fSQuentin Monnet 		offset_br = nfp_prog_current_offset(nfp_prog);
3176389f263bSQuentin Monnet 		wrp_immed_relo(nfp_prog, imm_b(nfp_prog), 0, RELO_IMMED_REL);
317744549623SQuentin Monnet 	} else {
317844549623SQuentin Monnet 		ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
317944549623SQuentin Monnet 		emit_br(nfp_prog, BR_UNC, meta->n + 1 + meta->insn.imm, 1);
318044549623SQuentin Monnet 		offset_br = nfp_prog_current_offset(nfp_prog);
318144549623SQuentin Monnet 	}
3182389f263bSQuentin Monnet 	wrp_immed_relo(nfp_prog, ret_reg(nfp_prog), ret_tgt, RELO_IMMED_REL);
3183389f263bSQuentin Monnet 
3184389f263bSQuentin Monnet 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
3185389f263bSQuentin Monnet 		return -EINVAL;
3186389f263bSQuentin Monnet 
3187389f263bSQuentin Monnet 	if (stack_depth) {
3188389f263bSQuentin Monnet 		tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
3189389f263bSQuentin Monnet 					  stack_imm(nfp_prog));
3190389f263bSQuentin Monnet 		emit_alu(nfp_prog, stack_reg(nfp_prog),
3191389f263bSQuentin Monnet 			 stack_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
3192389f263bSQuentin Monnet 		emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
3193389f263bSQuentin Monnet 			    NFP_CSR_ACT_LM_ADDR0);
3194389f263bSQuentin Monnet 		wrp_nops(nfp_prog, 3);
3195389f263bSQuentin Monnet 	}
3196389f263bSQuentin Monnet 
3197bdf4c66fSQuentin Monnet 	meta->num_insns_after_br = nfp_prog_current_offset(nfp_prog);
3198bdf4c66fSQuentin Monnet 	meta->num_insns_after_br -= offset_br;
3199bdf4c66fSQuentin Monnet 
3200389f263bSQuentin Monnet 	return 0;
3201389f263bSQuentin Monnet }
3202389f263bSQuentin Monnet 
3203389f263bSQuentin Monnet static int helper_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
32042cb230bdSJakub Kicinski {
32052cb230bdSJakub Kicinski 	switch (meta->insn.imm) {
32060d49eaf4SJakub Kicinski 	case BPF_FUNC_xdp_adjust_head:
32070d49eaf4SJakub Kicinski 		return adjust_head(nfp_prog, meta);
32080c261593SJakub Kicinski 	case BPF_FUNC_xdp_adjust_tail:
32090c261593SJakub Kicinski 		return adjust_tail(nfp_prog, meta);
321077a3d311SJakub Kicinski 	case BPF_FUNC_map_lookup_elem:
321144d65a47SJakub Kicinski 	case BPF_FUNC_map_update_elem:
3212bfee64deSJakub Kicinski 	case BPF_FUNC_map_delete_elem:
3213fc448497SJakub Kicinski 		return map_call_stack_common(nfp_prog, meta);
3214df4a37d8SJakub Kicinski 	case BPF_FUNC_get_prandom_u32:
3215df4a37d8SJakub Kicinski 		return nfp_get_prandom_u32(nfp_prog, meta);
32169816dd35SJakub Kicinski 	case BPF_FUNC_perf_event_output:
32179816dd35SJakub Kicinski 		return nfp_perf_event_output(nfp_prog, meta);
32182cb230bdSJakub Kicinski 	default:
32192cb230bdSJakub Kicinski 		WARN_ONCE(1, "verifier allowed unsupported function\n");
32202cb230bdSJakub Kicinski 		return -EOPNOTSUPP;
32212cb230bdSJakub Kicinski 	}
32222cb230bdSJakub Kicinski }
32232cb230bdSJakub Kicinski 
3224389f263bSQuentin Monnet static int call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3225389f263bSQuentin Monnet {
3226389f263bSQuentin Monnet 	if (is_mbpf_pseudo_call(meta))
3227389f263bSQuentin Monnet 		return bpf_to_bpf_call(nfp_prog, meta);
3228389f263bSQuentin Monnet 	else
3229389f263bSQuentin Monnet 		return helper_call(nfp_prog, meta);
3230389f263bSQuentin Monnet }
3231389f263bSQuentin Monnet 
3232389f263bSQuentin Monnet static bool nfp_is_main_function(struct nfp_insn_meta *meta)
3233389f263bSQuentin Monnet {
3234389f263bSQuentin Monnet 	return meta->subprog_idx == 0;
3235389f263bSQuentin Monnet }
3236389f263bSQuentin Monnet 
3237d9ae7f2bSJakub Kicinski static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3238d9ae7f2bSJakub Kicinski {
3239e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 0, RELO_BR_GO_OUT);
3240d9ae7f2bSJakub Kicinski 
3241d9ae7f2bSJakub Kicinski 	return 0;
3242d9ae7f2bSJakub Kicinski }
3243d9ae7f2bSJakub Kicinski 
3244389f263bSQuentin Monnet static int
3245389f263bSQuentin Monnet nfp_subprog_epilogue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3246389f263bSQuentin Monnet {
324744549623SQuentin Monnet 	if (nfp_prog->subprog[meta->subprog_idx].needs_reg_push) {
3248389f263bSQuentin Monnet 		/* Pop R6~R9 to the stack via related subroutine.
324944549623SQuentin Monnet 		 * We loaded the return address to the caller into ret_reg().
325044549623SQuentin Monnet 		 * This means that the subroutine does not come back here, we
325144549623SQuentin Monnet 		 * make it jump back to the subprogram caller directly!
3252389f263bSQuentin Monnet 		 */
3253389f263bSQuentin Monnet 		emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 1,
3254389f263bSQuentin Monnet 			     RELO_BR_GO_CALL_POP_REGS);
325544549623SQuentin Monnet 		/* Pop return address from the stack. */
3256389f263bSQuentin Monnet 		wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
325744549623SQuentin Monnet 	} else {
325844549623SQuentin Monnet 		/* Pop return address from the stack. */
325944549623SQuentin Monnet 		wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
326044549623SQuentin Monnet 		/* Jump back to caller if no callee-saved registers were used
326144549623SQuentin Monnet 		 * by the subprogram.
326244549623SQuentin Monnet 		 */
326344549623SQuentin Monnet 		emit_rtn(nfp_prog, ret_reg(nfp_prog), 0);
326444549623SQuentin Monnet 	}
3265389f263bSQuentin Monnet 
3266389f263bSQuentin Monnet 	return 0;
3267389f263bSQuentin Monnet }
3268389f263bSQuentin Monnet 
3269389f263bSQuentin Monnet static int jmp_exit(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3270389f263bSQuentin Monnet {
3271389f263bSQuentin Monnet 	if (nfp_is_main_function(meta))
3272389f263bSQuentin Monnet 		return goto_out(nfp_prog, meta);
3273389f263bSQuentin Monnet 	else
3274389f263bSQuentin Monnet 		return nfp_subprog_epilogue(nfp_prog, meta);
3275389f263bSQuentin Monnet }
3276389f263bSQuentin Monnet 
3277d9ae7f2bSJakub Kicinski static const instr_cb_t instr_cb[256] = {
3278d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_MOV | BPF_X] =	mov_reg64,
3279d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_MOV | BPF_K] =	mov_imm64,
3280d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_XOR | BPF_X] =	xor_reg64,
3281d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_XOR | BPF_K] =	xor_imm64,
3282d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_AND | BPF_X] =	and_reg64,
3283d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_AND | BPF_K] =	and_imm64,
3284d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_OR | BPF_X] =	or_reg64,
3285d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_OR | BPF_K] =	or_imm64,
3286d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_ADD | BPF_X] =	add_reg64,
3287d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_ADD | BPF_K] =	add_imm64,
3288d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_SUB | BPF_X] =	sub_reg64,
3289d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_SUB | BPF_K] =	sub_imm64,
3290d3d23fdbSJiong Wang 	[BPF_ALU64 | BPF_MUL | BPF_X] =	mul_reg64,
3291d3d23fdbSJiong Wang 	[BPF_ALU64 | BPF_MUL | BPF_K] =	mul_imm64,
32922a952b03SJiong Wang 	[BPF_ALU64 | BPF_DIV | BPF_X] =	div_reg64,
32932a952b03SJiong Wang 	[BPF_ALU64 | BPF_DIV | BPF_K] =	div_imm64,
3294254ef4d7SJiong Wang 	[BPF_ALU64 | BPF_NEG] =		neg_reg64,
3295991f5b36SJiong Wang 	[BPF_ALU64 | BPF_LSH | BPF_X] =	shl_reg64,
3296d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_LSH | BPF_K] =	shl_imm64,
3297991f5b36SJiong Wang 	[BPF_ALU64 | BPF_RSH | BPF_X] =	shr_reg64,
3298d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_RSH | BPF_K] =	shr_imm64,
3299c217abccSJiong Wang 	[BPF_ALU64 | BPF_ARSH | BPF_X] = ashr_reg64,
3300f43d0f17SJiong Wang 	[BPF_ALU64 | BPF_ARSH | BPF_K] = ashr_imm64,
3301d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_MOV | BPF_X] =	mov_reg,
3302d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_MOV | BPF_K] =	mov_imm,
3303d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_XOR | BPF_X] =	xor_reg,
3304d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_XOR | BPF_K] =	xor_imm,
3305d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_AND | BPF_X] =	and_reg,
3306d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_AND | BPF_K] =	and_imm,
3307d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_OR | BPF_X] =	or_reg,
3308d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_OR | BPF_K] =	or_imm,
3309d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_ADD | BPF_X] =	add_reg,
3310d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_ADD | BPF_K] =	add_imm,
3311d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_SUB | BPF_X] =	sub_reg,
3312d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_SUB | BPF_K] =	sub_imm,
3313d3d23fdbSJiong Wang 	[BPF_ALU | BPF_MUL | BPF_X] =	mul_reg,
3314d3d23fdbSJiong Wang 	[BPF_ALU | BPF_MUL | BPF_K] =	mul_imm,
33152a952b03SJiong Wang 	[BPF_ALU | BPF_DIV | BPF_X] =	div_reg,
33162a952b03SJiong Wang 	[BPF_ALU | BPF_DIV | BPF_K] =	div_imm,
3317254ef4d7SJiong Wang 	[BPF_ALU | BPF_NEG] =		neg_reg,
3318d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_LSH | BPF_K] =	shl_imm,
33193119d1fdSJakub Kicinski 	[BPF_ALU | BPF_END | BPF_X] =	end_reg32,
3320d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IMM | BPF_DW] =	imm_ld8,
3321d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_B] =	data_ld1,
3322d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_H] =	data_ld2,
3323d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_W] =	data_ld4,
3324d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_B] =	data_ind_ld1,
3325d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_H] =	data_ind_ld2,
3326d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_W] =	data_ind_ld4,
33272ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_B] =	mem_ldx1,
33282ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_H] =	mem_ldx2,
3329d9ae7f2bSJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_W] =	mem_ldx4,
33302ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_DW] =	mem_ldx8,
3331e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_B] =	mem_stx1,
3332e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_H] =	mem_stx2,
3333d9ae7f2bSJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_W] =	mem_stx4,
3334e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_DW] =	mem_stx8,
3335dcb0c27fSJakub Kicinski 	[BPF_STX | BPF_XADD | BPF_W] =	mem_xadd4,
3336dcb0c27fSJakub Kicinski 	[BPF_STX | BPF_XADD | BPF_DW] =	mem_xadd8,
3337e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_B] =	mem_st1,
3338e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_H] =	mem_st2,
3339e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_W] =	mem_st4,
3340e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_DW] =	mem_st8,
3341d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JA | BPF_K] =	jump,
3342d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JEQ | BPF_K] =	jeq_imm,
334361dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGT | BPF_K] =	cmp_imm,
334461dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGE | BPF_K] =	cmp_imm,
334561dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLT | BPF_K] =	cmp_imm,
334661dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLE | BPF_K] =	cmp_imm,
334761dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGT | BPF_K] =  cmp_imm,
334861dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGE | BPF_K] =  cmp_imm,
334961dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLT | BPF_K] =  cmp_imm,
335061dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLE | BPF_K] =  cmp_imm,
3351d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JSET | BPF_K] =	jset_imm,
3352d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JNE | BPF_K] =	jne_imm,
3353d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JEQ | BPF_X] =	jeq_reg,
335461dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGT | BPF_X] =	cmp_reg,
335561dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGE | BPF_X] =	cmp_reg,
335661dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLT | BPF_X] =	cmp_reg,
335761dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLE | BPF_X] =	cmp_reg,
335861dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGT | BPF_X] =  cmp_reg,
335961dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGE | BPF_X] =  cmp_reg,
336061dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLT | BPF_X] =  cmp_reg,
336161dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLE | BPF_X] =  cmp_reg,
3362d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JSET | BPF_X] =	jset_reg,
3363d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JNE | BPF_X] =	jne_reg,
33642cb230bdSJakub Kicinski 	[BPF_JMP | BPF_CALL] =		call,
3365389f263bSQuentin Monnet 	[BPF_JMP | BPF_EXIT] =		jmp_exit,
3366d9ae7f2bSJakub Kicinski };
3367d9ae7f2bSJakub Kicinski 
3368d9ae7f2bSJakub Kicinski /* --- Assembler logic --- */
33692178f3f0SQuentin Monnet static int
33702178f3f0SQuentin Monnet nfp_fixup_immed_relo(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
33712178f3f0SQuentin Monnet 		     struct nfp_insn_meta *jmp_dst, u32 br_idx)
33722178f3f0SQuentin Monnet {
33732178f3f0SQuentin Monnet 	if (immed_get_value(nfp_prog->prog[br_idx + 1])) {
33742178f3f0SQuentin Monnet 		pr_err("BUG: failed to fix up callee register saving\n");
33752178f3f0SQuentin Monnet 		return -EINVAL;
33762178f3f0SQuentin Monnet 	}
33772178f3f0SQuentin Monnet 
33782178f3f0SQuentin Monnet 	immed_set_value(&nfp_prog->prog[br_idx + 1], jmp_dst->off);
33792178f3f0SQuentin Monnet 
33802178f3f0SQuentin Monnet 	return 0;
33812178f3f0SQuentin Monnet }
33822178f3f0SQuentin Monnet 
3383d9ae7f2bSJakub Kicinski static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
3384d9ae7f2bSJakub Kicinski {
33855b674140SJiong Wang 	struct nfp_insn_meta *meta, *jmp_dst;
3386854dc87dSJiong Wang 	u32 idx, br_idx;
33872178f3f0SQuentin Monnet 	int err;
3388d9ae7f2bSJakub Kicinski 
3389854dc87dSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3390d9ae7f2bSJakub Kicinski 		if (meta->skip)
3391d9ae7f2bSJakub Kicinski 			continue;
3392d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(meta->insn.code) != BPF_JMP)
3393d9ae7f2bSJakub Kicinski 			continue;
3394bdf4c66fSQuentin Monnet 		if (meta->insn.code == (BPF_JMP | BPF_EXIT) &&
3395bdf4c66fSQuentin Monnet 		    !nfp_is_main_function(meta))
3396bdf4c66fSQuentin Monnet 			continue;
3397bdf4c66fSQuentin Monnet 		if (is_mbpf_helper_call(meta))
3398bdf4c66fSQuentin Monnet 			continue;
3399d9ae7f2bSJakub Kicinski 
34005b674140SJiong Wang 		if (list_is_last(&meta->l, &nfp_prog->insns))
34012314fe9eSJakub Kicinski 			br_idx = nfp_prog->last_bpf_off;
34025b674140SJiong Wang 		else
34032314fe9eSJakub Kicinski 			br_idx = list_next_entry(meta, l)->off - 1;
3404854dc87dSJiong Wang 
3405bdf4c66fSQuentin Monnet 		/* For BPF-to-BPF function call, a stack adjustment sequence is
3406bdf4c66fSQuentin Monnet 		 * generated after the return instruction. Therefore, we must
3407bdf4c66fSQuentin Monnet 		 * withdraw the length of this sequence to have br_idx pointing
3408bdf4c66fSQuentin Monnet 		 * to where the "branch" NFP instruction is expected to be.
3409bdf4c66fSQuentin Monnet 		 */
3410bdf4c66fSQuentin Monnet 		if (is_mbpf_pseudo_call(meta))
3411bdf4c66fSQuentin Monnet 			br_idx -= meta->num_insns_after_br;
3412bdf4c66fSQuentin Monnet 
3413d9ae7f2bSJakub Kicinski 		if (!nfp_is_br(nfp_prog->prog[br_idx])) {
3414d9ae7f2bSJakub Kicinski 			pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
3415d9ae7f2bSJakub Kicinski 			       br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
3416d9ae7f2bSJakub Kicinski 			return -ELOOP;
3417d9ae7f2bSJakub Kicinski 		}
3418bdf4c66fSQuentin Monnet 
3419bdf4c66fSQuentin Monnet 		if (meta->insn.code == (BPF_JMP | BPF_EXIT))
3420bdf4c66fSQuentin Monnet 			continue;
3421bdf4c66fSQuentin Monnet 
3422d9ae7f2bSJakub Kicinski 		/* Leave special branches for later */
34232314fe9eSJakub Kicinski 		if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
34242178f3f0SQuentin Monnet 		    RELO_BR_REL && !is_mbpf_pseudo_call(meta))
3425d9ae7f2bSJakub Kicinski 			continue;
3426d9ae7f2bSJakub Kicinski 
34275b674140SJiong Wang 		if (!meta->jmp_dst) {
34285b674140SJiong Wang 			pr_err("Non-exit jump doesn't have destination info recorded!!\n");
3429d9ae7f2bSJakub Kicinski 			return -ELOOP;
3430d9ae7f2bSJakub Kicinski 		}
3431d9ae7f2bSJakub Kicinski 
34325b674140SJiong Wang 		jmp_dst = meta->jmp_dst;
3433854dc87dSJiong Wang 
34345b674140SJiong Wang 		if (jmp_dst->skip) {
3435d9ae7f2bSJakub Kicinski 			pr_err("Branch landing on removed instruction!!\n");
3436d9ae7f2bSJakub Kicinski 			return -ELOOP;
3437d9ae7f2bSJakub Kicinski 		}
3438d9ae7f2bSJakub Kicinski 
343944549623SQuentin Monnet 		if (is_mbpf_pseudo_call(meta) &&
344044549623SQuentin Monnet 		    nfp_prog->subprog[jmp_dst->subprog_idx].needs_reg_push) {
34412178f3f0SQuentin Monnet 			err = nfp_fixup_immed_relo(nfp_prog, meta,
34422178f3f0SQuentin Monnet 						   jmp_dst, br_idx);
34432178f3f0SQuentin Monnet 			if (err)
34442178f3f0SQuentin Monnet 				return err;
34452178f3f0SQuentin Monnet 		}
34462178f3f0SQuentin Monnet 
34472178f3f0SQuentin Monnet 		if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
34482178f3f0SQuentin Monnet 		    RELO_BR_REL)
34492178f3f0SQuentin Monnet 			continue;
34502178f3f0SQuentin Monnet 
34512314fe9eSJakub Kicinski 		for (idx = meta->off; idx <= br_idx; idx++) {
3452d9ae7f2bSJakub Kicinski 			if (!nfp_is_br(nfp_prog->prog[idx]))
3453d9ae7f2bSJakub Kicinski 				continue;
34545b674140SJiong Wang 			br_set_offset(&nfp_prog->prog[idx], jmp_dst->off);
3455d9ae7f2bSJakub Kicinski 		}
3456d9ae7f2bSJakub Kicinski 	}
3457d9ae7f2bSJakub Kicinski 
3458d9ae7f2bSJakub Kicinski 	return 0;
3459d9ae7f2bSJakub Kicinski }
3460d9ae7f2bSJakub Kicinski 
3461d9ae7f2bSJakub Kicinski static void nfp_intro(struct nfp_prog *nfp_prog)
3462d9ae7f2bSJakub Kicinski {
346318e53b6cSJakub Kicinski 	wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0));
346418e53b6cSJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
346518e53b6cSJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog));
3466d9ae7f2bSJakub Kicinski }
3467d9ae7f2bSJakub Kicinski 
3468389f263bSQuentin Monnet static void
3469389f263bSQuentin Monnet nfp_subprog_prologue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3470389f263bSQuentin Monnet {
3471389f263bSQuentin Monnet 	/* Save return address into the stack. */
3472389f263bSQuentin Monnet 	wrp_mov(nfp_prog, reg_lm(0, 0), ret_reg(nfp_prog));
3473389f263bSQuentin Monnet }
3474389f263bSQuentin Monnet 
3475389f263bSQuentin Monnet static void
3476389f263bSQuentin Monnet nfp_start_subprog(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3477389f263bSQuentin Monnet {
3478389f263bSQuentin Monnet 	unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth;
3479389f263bSQuentin Monnet 
3480389f263bSQuentin Monnet 	nfp_prog->stack_frame_depth = round_up(depth, 4);
3481389f263bSQuentin Monnet 	nfp_subprog_prologue(nfp_prog, meta);
3482389f263bSQuentin Monnet }
3483389f263bSQuentin Monnet 
3484389f263bSQuentin Monnet bool nfp_is_subprog_start(struct nfp_insn_meta *meta)
3485389f263bSQuentin Monnet {
3486389f263bSQuentin Monnet 	return meta->flags & FLAG_INSN_IS_SUBPROG_START;
3487389f263bSQuentin Monnet }
3488389f263bSQuentin Monnet 
3489d9ae7f2bSJakub Kicinski static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
3490d9ae7f2bSJakub Kicinski {
3491d9ae7f2bSJakub Kicinski 	/* TC direct-action mode:
3492d9ae7f2bSJakub Kicinski 	 *   0,1   ok        NOT SUPPORTED[1]
3493d9ae7f2bSJakub Kicinski 	 *   2   drop  0x22 -> drop,  count as stat1
3494d9ae7f2bSJakub Kicinski 	 *   4,5 nuke  0x02 -> drop
3495d9ae7f2bSJakub Kicinski 	 *   7  redir  0x44 -> redir, count as stat2
3496d9ae7f2bSJakub Kicinski 	 *   * unspec  0x11 -> pass,  count as stat0
3497d9ae7f2bSJakub Kicinski 	 *
3498d9ae7f2bSJakub Kicinski 	 * [1] We can't support OK and RECLASSIFY because we can't tell TC
3499d9ae7f2bSJakub Kicinski 	 *     the exact decision made.  We are forced to support UNSPEC
3500d9ae7f2bSJakub Kicinski 	 *     to handle aborts so that's the only one we handle for passing
3501d9ae7f2bSJakub Kicinski 	 *     packets up the stack.
3502d9ae7f2bSJakub Kicinski 	 */
3503d9ae7f2bSJakub Kicinski 	/* Target for aborts */
3504d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
3505d9ae7f2bSJakub Kicinski 
3506e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3507d9ae7f2bSJakub Kicinski 
3508c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3509d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
3510d9ae7f2bSJakub Kicinski 
3511d9ae7f2bSJakub Kicinski 	/* Target for normal exits */
3512d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
3513d9ae7f2bSJakub Kicinski 
3514d9ae7f2bSJakub Kicinski 	/* if R0 > 7 jump to abort */
3515d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
3516d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
3517c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3518d9ae7f2bSJakub Kicinski 
3519d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(2), 0x41221211);
3520d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(3), 0x41001211);
3521d9ae7f2bSJakub Kicinski 
3522d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(1),
3523d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
3524d9ae7f2bSJakub Kicinski 
3525d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3526d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(2),
3527d9ae7f2bSJakub Kicinski 		 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
3528d9ae7f2bSJakub Kicinski 
3529d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3530d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3531d9ae7f2bSJakub Kicinski 		 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
3532d9ae7f2bSJakub Kicinski 
3533e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3534d9ae7f2bSJakub Kicinski 
3535d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3536d9ae7f2bSJakub Kicinski 		 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
3537d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
3538d9ae7f2bSJakub Kicinski }
3539d9ae7f2bSJakub Kicinski 
3540d9ae7f2bSJakub Kicinski static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
3541d9ae7f2bSJakub Kicinski {
3542d9ae7f2bSJakub Kicinski 	/* XDP return codes:
3543d9ae7f2bSJakub Kicinski 	 *   0 aborted  0x82 -> drop,  count as stat3
3544d9ae7f2bSJakub Kicinski 	 *   1    drop  0x22 -> drop,  count as stat1
3545d9ae7f2bSJakub Kicinski 	 *   2    pass  0x11 -> pass,  count as stat0
3546d9ae7f2bSJakub Kicinski 	 *   3      tx  0x44 -> redir, count as stat2
3547d9ae7f2bSJakub Kicinski 	 *   * unknown  0x82 -> drop,  count as stat3
3548d9ae7f2bSJakub Kicinski 	 */
3549d9ae7f2bSJakub Kicinski 	/* Target for aborts */
3550d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
3551d9ae7f2bSJakub Kicinski 
3552e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3553d9ae7f2bSJakub Kicinski 
3554c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3555d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
3556d9ae7f2bSJakub Kicinski 
3557d9ae7f2bSJakub Kicinski 	/* Target for normal exits */
3558d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
3559d9ae7f2bSJakub Kicinski 
3560d9ae7f2bSJakub Kicinski 	/* if R0 > 3 jump to abort */
3561d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
3562d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
3563d9ae7f2bSJakub Kicinski 
3564d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(2), 0x44112282);
3565d9ae7f2bSJakub Kicinski 
3566d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(1),
3567d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
3568d9ae7f2bSJakub Kicinski 
3569d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3570d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3571d9ae7f2bSJakub Kicinski 		 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
3572d9ae7f2bSJakub Kicinski 
3573e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3574d9ae7f2bSJakub Kicinski 
3575c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3576d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
3577d9ae7f2bSJakub Kicinski }
3578d9ae7f2bSJakub Kicinski 
357944549623SQuentin Monnet static bool nfp_prog_needs_callee_reg_save(struct nfp_prog *nfp_prog)
358044549623SQuentin Monnet {
358144549623SQuentin Monnet 	unsigned int idx;
358244549623SQuentin Monnet 
358344549623SQuentin Monnet 	for (idx = 1; idx < nfp_prog->subprog_cnt; idx++)
358444549623SQuentin Monnet 		if (nfp_prog->subprog[idx].needs_reg_push)
358544549623SQuentin Monnet 			return true;
358644549623SQuentin Monnet 
358744549623SQuentin Monnet 	return false;
358844549623SQuentin Monnet }
358944549623SQuentin Monnet 
3590389f263bSQuentin Monnet static void nfp_push_callee_registers(struct nfp_prog *nfp_prog)
3591389f263bSQuentin Monnet {
3592389f263bSQuentin Monnet 	u8 reg;
3593389f263bSQuentin Monnet 
3594389f263bSQuentin Monnet 	/* Subroutine: Save all callee saved registers (R6 ~ R9).
3595389f263bSQuentin Monnet 	 * imm_b() holds the return address.
3596389f263bSQuentin Monnet 	 */
3597389f263bSQuentin Monnet 	nfp_prog->tgt_call_push_regs = nfp_prog_current_offset(nfp_prog);
3598389f263bSQuentin Monnet 	for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
3599389f263bSQuentin Monnet 		u8 adj = (reg - BPF_REG_0) * 2;
3600389f263bSQuentin Monnet 		u8 idx = (reg - BPF_REG_6) * 2;
3601389f263bSQuentin Monnet 
3602389f263bSQuentin Monnet 		/* The first slot in the stack frame is used to push the return
3603389f263bSQuentin Monnet 		 * address in bpf_to_bpf_call(), start just after.
3604389f263bSQuentin Monnet 		 */
3605389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_lm(0, 1 + idx), reg_b(adj));
3606389f263bSQuentin Monnet 
3607389f263bSQuentin Monnet 		if (reg == BPF_REG_8)
3608389f263bSQuentin Monnet 			/* Prepare to jump back, last 3 insns use defer slots */
3609389f263bSQuentin Monnet 			emit_rtn(nfp_prog, imm_b(nfp_prog), 3);
3610389f263bSQuentin Monnet 
3611389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_lm(0, 1 + idx + 1), reg_b(adj + 1));
3612389f263bSQuentin Monnet 	}
3613389f263bSQuentin Monnet }
3614389f263bSQuentin Monnet 
3615389f263bSQuentin Monnet static void nfp_pop_callee_registers(struct nfp_prog *nfp_prog)
3616389f263bSQuentin Monnet {
3617389f263bSQuentin Monnet 	u8 reg;
3618389f263bSQuentin Monnet 
3619389f263bSQuentin Monnet 	/* Subroutine: Restore all callee saved registers (R6 ~ R9).
3620389f263bSQuentin Monnet 	 * ret_reg() holds the return address.
3621389f263bSQuentin Monnet 	 */
3622389f263bSQuentin Monnet 	nfp_prog->tgt_call_pop_regs = nfp_prog_current_offset(nfp_prog);
3623389f263bSQuentin Monnet 	for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
3624389f263bSQuentin Monnet 		u8 adj = (reg - BPF_REG_0) * 2;
3625389f263bSQuentin Monnet 		u8 idx = (reg - BPF_REG_6) * 2;
3626389f263bSQuentin Monnet 
3627389f263bSQuentin Monnet 		/* The first slot in the stack frame holds the return address,
3628389f263bSQuentin Monnet 		 * start popping just after that.
3629389f263bSQuentin Monnet 		 */
3630389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_both(adj), reg_lm(0, 1 + idx));
3631389f263bSQuentin Monnet 
3632389f263bSQuentin Monnet 		if (reg == BPF_REG_8)
3633389f263bSQuentin Monnet 			/* Prepare to jump back, last 3 insns use defer slots */
3634389f263bSQuentin Monnet 			emit_rtn(nfp_prog, ret_reg(nfp_prog), 3);
3635389f263bSQuentin Monnet 
3636389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_both(adj + 1), reg_lm(0, 1 + idx + 1));
3637389f263bSQuentin Monnet 	}
3638389f263bSQuentin Monnet }
3639389f263bSQuentin Monnet 
3640d9ae7f2bSJakub Kicinski static void nfp_outro(struct nfp_prog *nfp_prog)
3641d9ae7f2bSJakub Kicinski {
3642012bb8a8SJakub Kicinski 	switch (nfp_prog->type) {
3643012bb8a8SJakub Kicinski 	case BPF_PROG_TYPE_SCHED_CLS:
3644d9ae7f2bSJakub Kicinski 		nfp_outro_tc_da(nfp_prog);
3645d9ae7f2bSJakub Kicinski 		break;
3646012bb8a8SJakub Kicinski 	case BPF_PROG_TYPE_XDP:
3647d9ae7f2bSJakub Kicinski 		nfp_outro_xdp(nfp_prog);
3648d9ae7f2bSJakub Kicinski 		break;
3649012bb8a8SJakub Kicinski 	default:
3650012bb8a8SJakub Kicinski 		WARN_ON(1);
3651d9ae7f2bSJakub Kicinski 	}
3652389f263bSQuentin Monnet 
365344549623SQuentin Monnet 	if (!nfp_prog_needs_callee_reg_save(nfp_prog))
3654389f263bSQuentin Monnet 		return;
3655389f263bSQuentin Monnet 
3656389f263bSQuentin Monnet 	nfp_push_callee_registers(nfp_prog);
3657389f263bSQuentin Monnet 	nfp_pop_callee_registers(nfp_prog);
3658d9ae7f2bSJakub Kicinski }
3659d9ae7f2bSJakub Kicinski 
3660d9ae7f2bSJakub Kicinski static int nfp_translate(struct nfp_prog *nfp_prog)
3661d9ae7f2bSJakub Kicinski {
3662d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta;
3663389f263bSQuentin Monnet 	unsigned int depth;
3664ff42bb9fSJakub Kicinski 	int err;
3665d9ae7f2bSJakub Kicinski 
3666389f263bSQuentin Monnet 	depth = nfp_prog->subprog[0].stack_depth;
3667389f263bSQuentin Monnet 	nfp_prog->stack_frame_depth = round_up(depth, 4);
3668389f263bSQuentin Monnet 
3669d9ae7f2bSJakub Kicinski 	nfp_intro(nfp_prog);
3670d9ae7f2bSJakub Kicinski 	if (nfp_prog->error)
3671d9ae7f2bSJakub Kicinski 		return nfp_prog->error;
3672d9ae7f2bSJakub Kicinski 
3673d9ae7f2bSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3674d9ae7f2bSJakub Kicinski 		instr_cb_t cb = instr_cb[meta->insn.code];
3675d9ae7f2bSJakub Kicinski 
3676d9ae7f2bSJakub Kicinski 		meta->off = nfp_prog_current_offset(nfp_prog);
3677d9ae7f2bSJakub Kicinski 
3678389f263bSQuentin Monnet 		if (nfp_is_subprog_start(meta)) {
3679389f263bSQuentin Monnet 			nfp_start_subprog(nfp_prog, meta);
3680389f263bSQuentin Monnet 			if (nfp_prog->error)
3681389f263bSQuentin Monnet 				return nfp_prog->error;
3682389f263bSQuentin Monnet 		}
3683389f263bSQuentin Monnet 
3684d9ae7f2bSJakub Kicinski 		if (meta->skip) {
3685d9ae7f2bSJakub Kicinski 			nfp_prog->n_translated++;
3686d9ae7f2bSJakub Kicinski 			continue;
3687d9ae7f2bSJakub Kicinski 		}
3688d9ae7f2bSJakub Kicinski 
3689d9ae7f2bSJakub Kicinski 		if (nfp_meta_has_prev(nfp_prog, meta) &&
3690d9ae7f2bSJakub Kicinski 		    nfp_meta_prev(meta)->double_cb)
3691d9ae7f2bSJakub Kicinski 			cb = nfp_meta_prev(meta)->double_cb;
3692d9ae7f2bSJakub Kicinski 		if (!cb)
3693d9ae7f2bSJakub Kicinski 			return -ENOENT;
3694d9ae7f2bSJakub Kicinski 		err = cb(nfp_prog, meta);
3695d9ae7f2bSJakub Kicinski 		if (err)
3696d9ae7f2bSJakub Kicinski 			return err;
3697e8a4796eSJakub Kicinski 		if (nfp_prog->error)
3698e8a4796eSJakub Kicinski 			return nfp_prog->error;
3699d9ae7f2bSJakub Kicinski 
3700d9ae7f2bSJakub Kicinski 		nfp_prog->n_translated++;
3701d9ae7f2bSJakub Kicinski 	}
3702d9ae7f2bSJakub Kicinski 
3703854dc87dSJiong Wang 	nfp_prog->last_bpf_off = nfp_prog_current_offset(nfp_prog) - 1;
3704854dc87dSJiong Wang 
3705d9ae7f2bSJakub Kicinski 	nfp_outro(nfp_prog);
3706d9ae7f2bSJakub Kicinski 	if (nfp_prog->error)
3707d9ae7f2bSJakub Kicinski 		return nfp_prog->error;
3708d9ae7f2bSJakub Kicinski 
3709ff42bb9fSJakub Kicinski 	wrp_nops(nfp_prog, NFP_USTORE_PREFETCH_WINDOW);
37101c03e03fSJakub Kicinski 	if (nfp_prog->error)
37111c03e03fSJakub Kicinski 		return nfp_prog->error;
37121c03e03fSJakub Kicinski 
3713d9ae7f2bSJakub Kicinski 	return nfp_fixup_branches(nfp_prog);
3714d9ae7f2bSJakub Kicinski }
3715d9ae7f2bSJakub Kicinski 
3716d9ae7f2bSJakub Kicinski /* --- Optimizations --- */
3717d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
3718d9ae7f2bSJakub Kicinski {
3719d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta;
3720d9ae7f2bSJakub Kicinski 
3721d9ae7f2bSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3722d9ae7f2bSJakub Kicinski 		struct bpf_insn insn = meta->insn;
3723d9ae7f2bSJakub Kicinski 
3724d9ae7f2bSJakub Kicinski 		/* Programs converted from cBPF start with register xoring */
3725d9ae7f2bSJakub Kicinski 		if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
3726d9ae7f2bSJakub Kicinski 		    insn.src_reg == insn.dst_reg)
3727d9ae7f2bSJakub Kicinski 			continue;
3728d9ae7f2bSJakub Kicinski 
3729d9ae7f2bSJakub Kicinski 		/* Programs start with R6 = R1 but we ignore the skb pointer */
3730d9ae7f2bSJakub Kicinski 		if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
3731d9ae7f2bSJakub Kicinski 		    insn.src_reg == 1 && insn.dst_reg == 6)
3732d9ae7f2bSJakub Kicinski 			meta->skip = true;
3733d9ae7f2bSJakub Kicinski 
3734d9ae7f2bSJakub Kicinski 		/* Return as soon as something doesn't match */
3735d9ae7f2bSJakub Kicinski 		if (!meta->skip)
3736d9ae7f2bSJakub Kicinski 			return;
3737d9ae7f2bSJakub Kicinski 	}
3738d9ae7f2bSJakub Kicinski }
3739d9ae7f2bSJakub Kicinski 
37406c59500cSJakub Kicinski /* abs(insn.imm) will fit better into unrestricted reg immediate -
37416c59500cSJakub Kicinski  * convert add/sub of a negative number into a sub/add of a positive one.
37426c59500cSJakub Kicinski  */
37436c59500cSJakub Kicinski static void nfp_bpf_opt_neg_add_sub(struct nfp_prog *nfp_prog)
37446c59500cSJakub Kicinski {
37456c59500cSJakub Kicinski 	struct nfp_insn_meta *meta;
37466c59500cSJakub Kicinski 
37476c59500cSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
37486c59500cSJakub Kicinski 		struct bpf_insn insn = meta->insn;
37496c59500cSJakub Kicinski 
37506c59500cSJakub Kicinski 		if (meta->skip)
37516c59500cSJakub Kicinski 			continue;
37526c59500cSJakub Kicinski 
37536c59500cSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_ALU &&
37547bdc97beSJakub Kicinski 		    BPF_CLASS(insn.code) != BPF_ALU64 &&
37557bdc97beSJakub Kicinski 		    BPF_CLASS(insn.code) != BPF_JMP)
37566c59500cSJakub Kicinski 			continue;
37576c59500cSJakub Kicinski 		if (BPF_SRC(insn.code) != BPF_K)
37586c59500cSJakub Kicinski 			continue;
37596c59500cSJakub Kicinski 		if (insn.imm >= 0)
37606c59500cSJakub Kicinski 			continue;
37616c59500cSJakub Kicinski 
37627bdc97beSJakub Kicinski 		if (BPF_CLASS(insn.code) == BPF_JMP) {
37637bdc97beSJakub Kicinski 			switch (BPF_OP(insn.code)) {
37647bdc97beSJakub Kicinski 			case BPF_JGE:
37657bdc97beSJakub Kicinski 			case BPF_JSGE:
37667bdc97beSJakub Kicinski 			case BPF_JLT:
37677bdc97beSJakub Kicinski 			case BPF_JSLT:
37687bdc97beSJakub Kicinski 				meta->jump_neg_op = true;
37697bdc97beSJakub Kicinski 				break;
37707bdc97beSJakub Kicinski 			default:
37717bdc97beSJakub Kicinski 				continue;
37727bdc97beSJakub Kicinski 			}
37737bdc97beSJakub Kicinski 		} else {
37746c59500cSJakub Kicinski 			if (BPF_OP(insn.code) == BPF_ADD)
37756c59500cSJakub Kicinski 				insn.code = BPF_CLASS(insn.code) | BPF_SUB;
37766c59500cSJakub Kicinski 			else if (BPF_OP(insn.code) == BPF_SUB)
37776c59500cSJakub Kicinski 				insn.code = BPF_CLASS(insn.code) | BPF_ADD;
37786c59500cSJakub Kicinski 			else
37796c59500cSJakub Kicinski 				continue;
37806c59500cSJakub Kicinski 
37816c59500cSJakub Kicinski 			meta->insn.code = insn.code | BPF_K;
37827bdc97beSJakub Kicinski 		}
37836c59500cSJakub Kicinski 
37846c59500cSJakub Kicinski 		meta->insn.imm = -insn.imm;
37856c59500cSJakub Kicinski 	}
37866c59500cSJakub Kicinski }
37876c59500cSJakub Kicinski 
3788d9ae7f2bSJakub Kicinski /* Remove masking after load since our load guarantees this is not needed */
3789d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
3790d9ae7f2bSJakub Kicinski {
3791d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2;
3792d9ae7f2bSJakub Kicinski 	const s32 exp_mask[] = {
3793d9ae7f2bSJakub Kicinski 		[BPF_B] = 0x000000ffU,
3794d9ae7f2bSJakub Kicinski 		[BPF_H] = 0x0000ffffU,
3795d9ae7f2bSJakub Kicinski 		[BPF_W] = 0xffffffffU,
3796d9ae7f2bSJakub Kicinski 	};
3797d9ae7f2bSJakub Kicinski 
3798d9ae7f2bSJakub Kicinski 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
3799d9ae7f2bSJakub Kicinski 		struct bpf_insn insn, next;
3800d9ae7f2bSJakub Kicinski 
3801d9ae7f2bSJakub Kicinski 		insn = meta1->insn;
3802d9ae7f2bSJakub Kicinski 		next = meta2->insn;
3803d9ae7f2bSJakub Kicinski 
3804d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_LD)
3805d9ae7f2bSJakub Kicinski 			continue;
3806d9ae7f2bSJakub Kicinski 		if (BPF_MODE(insn.code) != BPF_ABS &&
3807d9ae7f2bSJakub Kicinski 		    BPF_MODE(insn.code) != BPF_IND)
3808d9ae7f2bSJakub Kicinski 			continue;
3809d9ae7f2bSJakub Kicinski 
3810d9ae7f2bSJakub Kicinski 		if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
3811d9ae7f2bSJakub Kicinski 			continue;
3812d9ae7f2bSJakub Kicinski 
3813d9ae7f2bSJakub Kicinski 		if (!exp_mask[BPF_SIZE(insn.code)])
3814d9ae7f2bSJakub Kicinski 			continue;
3815d9ae7f2bSJakub Kicinski 		if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
3816d9ae7f2bSJakub Kicinski 			continue;
3817d9ae7f2bSJakub Kicinski 
3818d9ae7f2bSJakub Kicinski 		if (next.src_reg || next.dst_reg)
3819d9ae7f2bSJakub Kicinski 			continue;
3820d9ae7f2bSJakub Kicinski 
38211266f5d6SJiong Wang 		if (meta2->flags & FLAG_INSN_IS_JUMP_DST)
38221266f5d6SJiong Wang 			continue;
38231266f5d6SJiong Wang 
3824d9ae7f2bSJakub Kicinski 		meta2->skip = true;
3825d9ae7f2bSJakub Kicinski 	}
3826d9ae7f2bSJakub Kicinski }
3827d9ae7f2bSJakub Kicinski 
3828d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
3829d9ae7f2bSJakub Kicinski {
3830d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2, *meta3;
3831d9ae7f2bSJakub Kicinski 
3832d9ae7f2bSJakub Kicinski 	nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
3833d9ae7f2bSJakub Kicinski 		struct bpf_insn insn, next1, next2;
3834d9ae7f2bSJakub Kicinski 
3835d9ae7f2bSJakub Kicinski 		insn = meta1->insn;
3836d9ae7f2bSJakub Kicinski 		next1 = meta2->insn;
3837d9ae7f2bSJakub Kicinski 		next2 = meta3->insn;
3838d9ae7f2bSJakub Kicinski 
3839d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_LD)
3840d9ae7f2bSJakub Kicinski 			continue;
3841d9ae7f2bSJakub Kicinski 		if (BPF_MODE(insn.code) != BPF_ABS &&
3842d9ae7f2bSJakub Kicinski 		    BPF_MODE(insn.code) != BPF_IND)
3843d9ae7f2bSJakub Kicinski 			continue;
3844d9ae7f2bSJakub Kicinski 		if (BPF_SIZE(insn.code) != BPF_W)
3845d9ae7f2bSJakub Kicinski 			continue;
3846d9ae7f2bSJakub Kicinski 
3847d9ae7f2bSJakub Kicinski 		if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
3848d9ae7f2bSJakub Kicinski 		      next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
3849d9ae7f2bSJakub Kicinski 		    !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
3850d9ae7f2bSJakub Kicinski 		      next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
3851d9ae7f2bSJakub Kicinski 			continue;
3852d9ae7f2bSJakub Kicinski 
3853d9ae7f2bSJakub Kicinski 		if (next1.src_reg || next1.dst_reg ||
3854d9ae7f2bSJakub Kicinski 		    next2.src_reg || next2.dst_reg)
3855d9ae7f2bSJakub Kicinski 			continue;
3856d9ae7f2bSJakub Kicinski 
3857d9ae7f2bSJakub Kicinski 		if (next1.imm != 0x20 || next2.imm != 0x20)
3858d9ae7f2bSJakub Kicinski 			continue;
3859d9ae7f2bSJakub Kicinski 
386029fe46efSJiong Wang 		if (meta2->flags & FLAG_INSN_IS_JUMP_DST ||
386129fe46efSJiong Wang 		    meta3->flags & FLAG_INSN_IS_JUMP_DST)
386229fe46efSJiong Wang 			continue;
386329fe46efSJiong Wang 
3864d9ae7f2bSJakub Kicinski 		meta2->skip = true;
3865d9ae7f2bSJakub Kicinski 		meta3->skip = true;
3866d9ae7f2bSJakub Kicinski 	}
3867d9ae7f2bSJakub Kicinski }
3868d9ae7f2bSJakub Kicinski 
38696bc7103cSJiong Wang /* load/store pair that forms memory copy sould look like the following:
38706bc7103cSJiong Wang  *
38716bc7103cSJiong Wang  *   ld_width R, [addr_src + offset_src]
38726bc7103cSJiong Wang  *   st_width [addr_dest + offset_dest], R
38736bc7103cSJiong Wang  *
38746bc7103cSJiong Wang  * The destination register of load and source register of store should
38756bc7103cSJiong Wang  * be the same, load and store should also perform at the same width.
38766bc7103cSJiong Wang  * If either of addr_src or addr_dest is stack pointer, we don't do the
38776bc7103cSJiong Wang  * CPP optimization as stack is modelled by registers on NFP.
38786bc7103cSJiong Wang  */
38796bc7103cSJiong Wang static bool
38806bc7103cSJiong Wang curr_pair_is_memcpy(struct nfp_insn_meta *ld_meta,
38816bc7103cSJiong Wang 		    struct nfp_insn_meta *st_meta)
38826bc7103cSJiong Wang {
38836bc7103cSJiong Wang 	struct bpf_insn *ld = &ld_meta->insn;
38846bc7103cSJiong Wang 	struct bpf_insn *st = &st_meta->insn;
38856bc7103cSJiong Wang 
38866bc7103cSJiong Wang 	if (!is_mbpf_load(ld_meta) || !is_mbpf_store(st_meta))
38876bc7103cSJiong Wang 		return false;
38886bc7103cSJiong Wang 
3889cc0dff6dSJiong Wang 	if (ld_meta->ptr.type != PTR_TO_PACKET &&
3890cc0dff6dSJiong Wang 	    ld_meta->ptr.type != PTR_TO_MAP_VALUE)
38916bc7103cSJiong Wang 		return false;
38926bc7103cSJiong Wang 
38936bc7103cSJiong Wang 	if (st_meta->ptr.type != PTR_TO_PACKET)
38946bc7103cSJiong Wang 		return false;
38956bc7103cSJiong Wang 
38966bc7103cSJiong Wang 	if (BPF_SIZE(ld->code) != BPF_SIZE(st->code))
38976bc7103cSJiong Wang 		return false;
38986bc7103cSJiong Wang 
38996bc7103cSJiong Wang 	if (ld->dst_reg != st->src_reg)
39006bc7103cSJiong Wang 		return false;
39016bc7103cSJiong Wang 
39026bc7103cSJiong Wang 	/* There is jump to the store insn in this pair. */
39036bc7103cSJiong Wang 	if (st_meta->flags & FLAG_INSN_IS_JUMP_DST)
39046bc7103cSJiong Wang 		return false;
39056bc7103cSJiong Wang 
39066bc7103cSJiong Wang 	return true;
39076bc7103cSJiong Wang }
39086bc7103cSJiong Wang 
39096bc7103cSJiong Wang /* Currently, we only support chaining load/store pairs if:
39106bc7103cSJiong Wang  *
39116bc7103cSJiong Wang  *  - Their address base registers are the same.
39126bc7103cSJiong Wang  *  - Their address offsets are in the same order.
39136bc7103cSJiong Wang  *  - They operate at the same memory width.
39146bc7103cSJiong Wang  *  - There is no jump into the middle of them.
39156bc7103cSJiong Wang  */
39166bc7103cSJiong Wang static bool
39176bc7103cSJiong Wang curr_pair_chain_with_previous(struct nfp_insn_meta *ld_meta,
39186bc7103cSJiong Wang 			      struct nfp_insn_meta *st_meta,
39196bc7103cSJiong Wang 			      struct bpf_insn *prev_ld,
39206bc7103cSJiong Wang 			      struct bpf_insn *prev_st)
39216bc7103cSJiong Wang {
39226bc7103cSJiong Wang 	u8 prev_size, curr_size, prev_ld_base, prev_st_base, prev_ld_dst;
39236bc7103cSJiong Wang 	struct bpf_insn *ld = &ld_meta->insn;
39246bc7103cSJiong Wang 	struct bpf_insn *st = &st_meta->insn;
39256bc7103cSJiong Wang 	s16 prev_ld_off, prev_st_off;
39266bc7103cSJiong Wang 
39276bc7103cSJiong Wang 	/* This pair is the start pair. */
39286bc7103cSJiong Wang 	if (!prev_ld)
39296bc7103cSJiong Wang 		return true;
39306bc7103cSJiong Wang 
39316bc7103cSJiong Wang 	prev_size = BPF_LDST_BYTES(prev_ld);
39326bc7103cSJiong Wang 	curr_size = BPF_LDST_BYTES(ld);
39336bc7103cSJiong Wang 	prev_ld_base = prev_ld->src_reg;
39346bc7103cSJiong Wang 	prev_st_base = prev_st->dst_reg;
39356bc7103cSJiong Wang 	prev_ld_dst = prev_ld->dst_reg;
39366bc7103cSJiong Wang 	prev_ld_off = prev_ld->off;
39376bc7103cSJiong Wang 	prev_st_off = prev_st->off;
39386bc7103cSJiong Wang 
39396bc7103cSJiong Wang 	if (ld->dst_reg != prev_ld_dst)
39406bc7103cSJiong Wang 		return false;
39416bc7103cSJiong Wang 
39426bc7103cSJiong Wang 	if (ld->src_reg != prev_ld_base || st->dst_reg != prev_st_base)
39436bc7103cSJiong Wang 		return false;
39446bc7103cSJiong Wang 
39456bc7103cSJiong Wang 	if (curr_size != prev_size)
39466bc7103cSJiong Wang 		return false;
39476bc7103cSJiong Wang 
39486bc7103cSJiong Wang 	/* There is jump to the head of this pair. */
39496bc7103cSJiong Wang 	if (ld_meta->flags & FLAG_INSN_IS_JUMP_DST)
39506bc7103cSJiong Wang 		return false;
39516bc7103cSJiong Wang 
39526bc7103cSJiong Wang 	/* Both in ascending order. */
39536bc7103cSJiong Wang 	if (prev_ld_off + prev_size == ld->off &&
39546bc7103cSJiong Wang 	    prev_st_off + prev_size == st->off)
39556bc7103cSJiong Wang 		return true;
39566bc7103cSJiong Wang 
39576bc7103cSJiong Wang 	/* Both in descending order. */
39586bc7103cSJiong Wang 	if (ld->off + curr_size == prev_ld_off &&
39596bc7103cSJiong Wang 	    st->off + curr_size == prev_st_off)
39606bc7103cSJiong Wang 		return true;
39616bc7103cSJiong Wang 
39626bc7103cSJiong Wang 	return false;
39636bc7103cSJiong Wang }
39646bc7103cSJiong Wang 
39656bc7103cSJiong Wang /* Return TRUE if cross memory access happens. Cross memory access means
39666bc7103cSJiong Wang  * store area is overlapping with load area that a later load might load
39676bc7103cSJiong Wang  * the value from previous store, for this case we can't treat the sequence
39686bc7103cSJiong Wang  * as an memory copy.
39696bc7103cSJiong Wang  */
39706bc7103cSJiong Wang static bool
39716bc7103cSJiong Wang cross_mem_access(struct bpf_insn *ld, struct nfp_insn_meta *head_ld_meta,
39726bc7103cSJiong Wang 		 struct nfp_insn_meta *head_st_meta)
39736bc7103cSJiong Wang {
39746bc7103cSJiong Wang 	s16 head_ld_off, head_st_off, ld_off;
39756bc7103cSJiong Wang 
39766bc7103cSJiong Wang 	/* Different pointer types does not overlap. */
39776bc7103cSJiong Wang 	if (head_ld_meta->ptr.type != head_st_meta->ptr.type)
39786bc7103cSJiong Wang 		return false;
39796bc7103cSJiong Wang 
39806bc7103cSJiong Wang 	/* load and store are both PTR_TO_PACKET, check ID info.  */
39816bc7103cSJiong Wang 	if (head_ld_meta->ptr.id != head_st_meta->ptr.id)
39826bc7103cSJiong Wang 		return true;
39836bc7103cSJiong Wang 
39846bc7103cSJiong Wang 	/* Canonicalize the offsets. Turn all of them against the original
39856bc7103cSJiong Wang 	 * base register.
39866bc7103cSJiong Wang 	 */
39876bc7103cSJiong Wang 	head_ld_off = head_ld_meta->insn.off + head_ld_meta->ptr.off;
39886bc7103cSJiong Wang 	head_st_off = head_st_meta->insn.off + head_st_meta->ptr.off;
39896bc7103cSJiong Wang 	ld_off = ld->off + head_ld_meta->ptr.off;
39906bc7103cSJiong Wang 
39916bc7103cSJiong Wang 	/* Ascending order cross. */
39926bc7103cSJiong Wang 	if (ld_off > head_ld_off &&
39936bc7103cSJiong Wang 	    head_ld_off < head_st_off && ld_off >= head_st_off)
39946bc7103cSJiong Wang 		return true;
39956bc7103cSJiong Wang 
39966bc7103cSJiong Wang 	/* Descending order cross. */
39976bc7103cSJiong Wang 	if (ld_off < head_ld_off &&
39986bc7103cSJiong Wang 	    head_ld_off > head_st_off && ld_off <= head_st_off)
39996bc7103cSJiong Wang 		return true;
40006bc7103cSJiong Wang 
40016bc7103cSJiong Wang 	return false;
40026bc7103cSJiong Wang }
40036bc7103cSJiong Wang 
40046bc7103cSJiong Wang /* This pass try to identify the following instructoin sequences.
40056bc7103cSJiong Wang  *
40066bc7103cSJiong Wang  *   load R, [regA + offA]
40076bc7103cSJiong Wang  *   store [regB + offB], R
40086bc7103cSJiong Wang  *   load R, [regA + offA + const_imm_A]
40096bc7103cSJiong Wang  *   store [regB + offB + const_imm_A], R
40106bc7103cSJiong Wang  *   load R, [regA + offA + 2 * const_imm_A]
40116bc7103cSJiong Wang  *   store [regB + offB + 2 * const_imm_A], R
40126bc7103cSJiong Wang  *   ...
40136bc7103cSJiong Wang  *
40146bc7103cSJiong Wang  * Above sequence is typically generated by compiler when lowering
40156bc7103cSJiong Wang  * memcpy. NFP prefer using CPP instructions to accelerate it.
40166bc7103cSJiong Wang  */
40176bc7103cSJiong Wang static void nfp_bpf_opt_ldst_gather(struct nfp_prog *nfp_prog)
40186bc7103cSJiong Wang {
40196bc7103cSJiong Wang 	struct nfp_insn_meta *head_ld_meta = NULL;
40206bc7103cSJiong Wang 	struct nfp_insn_meta *head_st_meta = NULL;
40216bc7103cSJiong Wang 	struct nfp_insn_meta *meta1, *meta2;
40226bc7103cSJiong Wang 	struct bpf_insn *prev_ld = NULL;
40236bc7103cSJiong Wang 	struct bpf_insn *prev_st = NULL;
40246bc7103cSJiong Wang 	u8 count = 0;
40256bc7103cSJiong Wang 
40266bc7103cSJiong Wang 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
40276bc7103cSJiong Wang 		struct bpf_insn *ld = &meta1->insn;
40286bc7103cSJiong Wang 		struct bpf_insn *st = &meta2->insn;
40296bc7103cSJiong Wang 
40306bc7103cSJiong Wang 		/* Reset record status if any of the following if true:
40316bc7103cSJiong Wang 		 *   - The current insn pair is not load/store.
40326bc7103cSJiong Wang 		 *   - The load/store pair doesn't chain with previous one.
40336bc7103cSJiong Wang 		 *   - The chained load/store pair crossed with previous pair.
40346bc7103cSJiong Wang 		 *   - The chained load/store pair has a total size of memory
40356bc7103cSJiong Wang 		 *     copy beyond 128 bytes which is the maximum length a
40366bc7103cSJiong Wang 		 *     single NFP CPP command can transfer.
40376bc7103cSJiong Wang 		 */
40386bc7103cSJiong Wang 		if (!curr_pair_is_memcpy(meta1, meta2) ||
40396bc7103cSJiong Wang 		    !curr_pair_chain_with_previous(meta1, meta2, prev_ld,
40406bc7103cSJiong Wang 						   prev_st) ||
40416bc7103cSJiong Wang 		    (head_ld_meta && (cross_mem_access(ld, head_ld_meta,
40426bc7103cSJiong Wang 						       head_st_meta) ||
40436bc7103cSJiong Wang 				      head_ld_meta->ldst_gather_len >= 128))) {
40446bc7103cSJiong Wang 			if (!count)
40456bc7103cSJiong Wang 				continue;
40466bc7103cSJiong Wang 
40476bc7103cSJiong Wang 			if (count > 1) {
40486bc7103cSJiong Wang 				s16 prev_ld_off = prev_ld->off;
40496bc7103cSJiong Wang 				s16 prev_st_off = prev_st->off;
40506bc7103cSJiong Wang 				s16 head_ld_off = head_ld_meta->insn.off;
40516bc7103cSJiong Wang 
40526bc7103cSJiong Wang 				if (prev_ld_off < head_ld_off) {
40536bc7103cSJiong Wang 					head_ld_meta->insn.off = prev_ld_off;
40546bc7103cSJiong Wang 					head_st_meta->insn.off = prev_st_off;
40556bc7103cSJiong Wang 					head_ld_meta->ldst_gather_len =
40566bc7103cSJiong Wang 						-head_ld_meta->ldst_gather_len;
40576bc7103cSJiong Wang 				}
40586bc7103cSJiong Wang 
40596bc7103cSJiong Wang 				head_ld_meta->paired_st = &head_st_meta->insn;
40606bc7103cSJiong Wang 				head_st_meta->skip = true;
40616bc7103cSJiong Wang 			} else {
40626bc7103cSJiong Wang 				head_ld_meta->ldst_gather_len = 0;
40636bc7103cSJiong Wang 			}
40646bc7103cSJiong Wang 
40656bc7103cSJiong Wang 			/* If the chain is ended by an load/store pair then this
40666bc7103cSJiong Wang 			 * could serve as the new head of the the next chain.
40676bc7103cSJiong Wang 			 */
40686bc7103cSJiong Wang 			if (curr_pair_is_memcpy(meta1, meta2)) {
40696bc7103cSJiong Wang 				head_ld_meta = meta1;
40706bc7103cSJiong Wang 				head_st_meta = meta2;
40716bc7103cSJiong Wang 				head_ld_meta->ldst_gather_len =
40726bc7103cSJiong Wang 					BPF_LDST_BYTES(ld);
40736bc7103cSJiong Wang 				meta1 = nfp_meta_next(meta1);
40746bc7103cSJiong Wang 				meta2 = nfp_meta_next(meta2);
40756bc7103cSJiong Wang 				prev_ld = ld;
40766bc7103cSJiong Wang 				prev_st = st;
40776bc7103cSJiong Wang 				count = 1;
40786bc7103cSJiong Wang 			} else {
40796bc7103cSJiong Wang 				head_ld_meta = NULL;
40806bc7103cSJiong Wang 				head_st_meta = NULL;
40816bc7103cSJiong Wang 				prev_ld = NULL;
40826bc7103cSJiong Wang 				prev_st = NULL;
40836bc7103cSJiong Wang 				count = 0;
40846bc7103cSJiong Wang 			}
40856bc7103cSJiong Wang 
40866bc7103cSJiong Wang 			continue;
40876bc7103cSJiong Wang 		}
40886bc7103cSJiong Wang 
40896bc7103cSJiong Wang 		if (!head_ld_meta) {
40906bc7103cSJiong Wang 			head_ld_meta = meta1;
40916bc7103cSJiong Wang 			head_st_meta = meta2;
40926bc7103cSJiong Wang 		} else {
40936bc7103cSJiong Wang 			meta1->skip = true;
40946bc7103cSJiong Wang 			meta2->skip = true;
40956bc7103cSJiong Wang 		}
40966bc7103cSJiong Wang 
40976bc7103cSJiong Wang 		head_ld_meta->ldst_gather_len += BPF_LDST_BYTES(ld);
40986bc7103cSJiong Wang 		meta1 = nfp_meta_next(meta1);
40996bc7103cSJiong Wang 		meta2 = nfp_meta_next(meta2);
41006bc7103cSJiong Wang 		prev_ld = ld;
41016bc7103cSJiong Wang 		prev_st = st;
41026bc7103cSJiong Wang 		count++;
41036bc7103cSJiong Wang 	}
41046bc7103cSJiong Wang }
41056bc7103cSJiong Wang 
410687b10ecdSJiong Wang static void nfp_bpf_opt_pkt_cache(struct nfp_prog *nfp_prog)
410787b10ecdSJiong Wang {
410887b10ecdSJiong Wang 	struct nfp_insn_meta *meta, *range_node = NULL;
410987b10ecdSJiong Wang 	s16 range_start = 0, range_end = 0;
411087b10ecdSJiong Wang 	bool cache_avail = false;
411187b10ecdSJiong Wang 	struct bpf_insn *insn;
411287b10ecdSJiong Wang 	s32 range_ptr_off = 0;
411387b10ecdSJiong Wang 	u32 range_ptr_id = 0;
411487b10ecdSJiong Wang 
411587b10ecdSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
411687b10ecdSJiong Wang 		if (meta->flags & FLAG_INSN_IS_JUMP_DST)
411787b10ecdSJiong Wang 			cache_avail = false;
411887b10ecdSJiong Wang 
411987b10ecdSJiong Wang 		if (meta->skip)
412087b10ecdSJiong Wang 			continue;
412187b10ecdSJiong Wang 
412287b10ecdSJiong Wang 		insn = &meta->insn;
412387b10ecdSJiong Wang 
412487b10ecdSJiong Wang 		if (is_mbpf_store_pkt(meta) ||
412587b10ecdSJiong Wang 		    insn->code == (BPF_JMP | BPF_CALL) ||
412687b10ecdSJiong Wang 		    is_mbpf_classic_store_pkt(meta) ||
412787b10ecdSJiong Wang 		    is_mbpf_classic_load(meta)) {
412887b10ecdSJiong Wang 			cache_avail = false;
412987b10ecdSJiong Wang 			continue;
413087b10ecdSJiong Wang 		}
413187b10ecdSJiong Wang 
413287b10ecdSJiong Wang 		if (!is_mbpf_load(meta))
413387b10ecdSJiong Wang 			continue;
413487b10ecdSJiong Wang 
413587b10ecdSJiong Wang 		if (meta->ptr.type != PTR_TO_PACKET || meta->ldst_gather_len) {
413687b10ecdSJiong Wang 			cache_avail = false;
413787b10ecdSJiong Wang 			continue;
413887b10ecdSJiong Wang 		}
413987b10ecdSJiong Wang 
414087b10ecdSJiong Wang 		if (!cache_avail) {
414187b10ecdSJiong Wang 			cache_avail = true;
414287b10ecdSJiong Wang 			if (range_node)
414387b10ecdSJiong Wang 				goto end_current_then_start_new;
414487b10ecdSJiong Wang 			goto start_new;
414587b10ecdSJiong Wang 		}
414687b10ecdSJiong Wang 
414787b10ecdSJiong Wang 		/* Check ID to make sure two reads share the same
414887b10ecdSJiong Wang 		 * variable offset against PTR_TO_PACKET, and check OFF
414987b10ecdSJiong Wang 		 * to make sure they also share the same constant
415087b10ecdSJiong Wang 		 * offset.
415187b10ecdSJiong Wang 		 *
415287b10ecdSJiong Wang 		 * OFFs don't really need to be the same, because they
415387b10ecdSJiong Wang 		 * are the constant offsets against PTR_TO_PACKET, so
415487b10ecdSJiong Wang 		 * for different OFFs, we could canonicalize them to
415587b10ecdSJiong Wang 		 * offsets against original packet pointer. We don't
415687b10ecdSJiong Wang 		 * support this.
415787b10ecdSJiong Wang 		 */
415887b10ecdSJiong Wang 		if (meta->ptr.id == range_ptr_id &&
415987b10ecdSJiong Wang 		    meta->ptr.off == range_ptr_off) {
416087b10ecdSJiong Wang 			s16 new_start = range_start;
416187b10ecdSJiong Wang 			s16 end, off = insn->off;
416287b10ecdSJiong Wang 			s16 new_end = range_end;
416387b10ecdSJiong Wang 			bool changed = false;
416487b10ecdSJiong Wang 
416587b10ecdSJiong Wang 			if (off < range_start) {
416687b10ecdSJiong Wang 				new_start = off;
416787b10ecdSJiong Wang 				changed = true;
416887b10ecdSJiong Wang 			}
416987b10ecdSJiong Wang 
417087b10ecdSJiong Wang 			end = off + BPF_LDST_BYTES(insn);
417187b10ecdSJiong Wang 			if (end > range_end) {
417287b10ecdSJiong Wang 				new_end = end;
417387b10ecdSJiong Wang 				changed = true;
417487b10ecdSJiong Wang 			}
417587b10ecdSJiong Wang 
417687b10ecdSJiong Wang 			if (!changed)
417787b10ecdSJiong Wang 				continue;
417887b10ecdSJiong Wang 
417987b10ecdSJiong Wang 			if (new_end - new_start <= 64) {
418087b10ecdSJiong Wang 				/* Install new range. */
418187b10ecdSJiong Wang 				range_start = new_start;
418287b10ecdSJiong Wang 				range_end = new_end;
418387b10ecdSJiong Wang 				continue;
418487b10ecdSJiong Wang 			}
418587b10ecdSJiong Wang 		}
418687b10ecdSJiong Wang 
418787b10ecdSJiong Wang end_current_then_start_new:
418887b10ecdSJiong Wang 		range_node->pkt_cache.range_start = range_start;
418987b10ecdSJiong Wang 		range_node->pkt_cache.range_end = range_end;
419087b10ecdSJiong Wang start_new:
419187b10ecdSJiong Wang 		range_node = meta;
419287b10ecdSJiong Wang 		range_node->pkt_cache.do_init = true;
419387b10ecdSJiong Wang 		range_ptr_id = range_node->ptr.id;
419487b10ecdSJiong Wang 		range_ptr_off = range_node->ptr.off;
419587b10ecdSJiong Wang 		range_start = insn->off;
419687b10ecdSJiong Wang 		range_end = insn->off + BPF_LDST_BYTES(insn);
419787b10ecdSJiong Wang 	}
419887b10ecdSJiong Wang 
419987b10ecdSJiong Wang 	if (range_node) {
420087b10ecdSJiong Wang 		range_node->pkt_cache.range_start = range_start;
420187b10ecdSJiong Wang 		range_node->pkt_cache.range_end = range_end;
420287b10ecdSJiong Wang 	}
420387b10ecdSJiong Wang 
420487b10ecdSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
420587b10ecdSJiong Wang 		if (meta->skip)
420687b10ecdSJiong Wang 			continue;
420787b10ecdSJiong Wang 
420887b10ecdSJiong Wang 		if (is_mbpf_load_pkt(meta) && !meta->ldst_gather_len) {
420987b10ecdSJiong Wang 			if (meta->pkt_cache.do_init) {
421087b10ecdSJiong Wang 				range_start = meta->pkt_cache.range_start;
421187b10ecdSJiong Wang 				range_end = meta->pkt_cache.range_end;
421287b10ecdSJiong Wang 			} else {
421387b10ecdSJiong Wang 				meta->pkt_cache.range_start = range_start;
421487b10ecdSJiong Wang 				meta->pkt_cache.range_end = range_end;
421587b10ecdSJiong Wang 			}
421687b10ecdSJiong Wang 		}
421787b10ecdSJiong Wang 	}
421887b10ecdSJiong Wang }
421987b10ecdSJiong Wang 
4220d9ae7f2bSJakub Kicinski static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
4221d9ae7f2bSJakub Kicinski {
4222d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_reg_init(nfp_prog);
4223d9ae7f2bSJakub Kicinski 
42246c59500cSJakub Kicinski 	nfp_bpf_opt_neg_add_sub(nfp_prog);
4225d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_ld_mask(nfp_prog);
4226d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_ld_shift(nfp_prog);
42276bc7103cSJiong Wang 	nfp_bpf_opt_ldst_gather(nfp_prog);
422887b10ecdSJiong Wang 	nfp_bpf_opt_pkt_cache(nfp_prog);
4229d9ae7f2bSJakub Kicinski 
4230d9ae7f2bSJakub Kicinski 	return 0;
4231d9ae7f2bSJakub Kicinski }
4232d9ae7f2bSJakub Kicinski 
4233b4264c96SJakub Kicinski static int nfp_bpf_replace_map_ptrs(struct nfp_prog *nfp_prog)
4234b4264c96SJakub Kicinski {
4235b4264c96SJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2;
4236b4264c96SJakub Kicinski 	struct nfp_bpf_map *nfp_map;
4237b4264c96SJakub Kicinski 	struct bpf_map *map;
4238ab01f4acSJakub Kicinski 	u32 id;
4239b4264c96SJakub Kicinski 
4240b4264c96SJakub Kicinski 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
4241b4264c96SJakub Kicinski 		if (meta1->skip || meta2->skip)
4242b4264c96SJakub Kicinski 			continue;
4243b4264c96SJakub Kicinski 
4244b4264c96SJakub Kicinski 		if (meta1->insn.code != (BPF_LD | BPF_IMM | BPF_DW) ||
4245b4264c96SJakub Kicinski 		    meta1->insn.src_reg != BPF_PSEUDO_MAP_FD)
4246b4264c96SJakub Kicinski 			continue;
4247b4264c96SJakub Kicinski 
4248b4264c96SJakub Kicinski 		map = (void *)(unsigned long)((u32)meta1->insn.imm |
4249b4264c96SJakub Kicinski 					      (u64)meta2->insn.imm << 32);
4250ab01f4acSJakub Kicinski 		if (bpf_map_offload_neutral(map)) {
4251ab01f4acSJakub Kicinski 			id = map->id;
4252ab01f4acSJakub Kicinski 		} else {
4253b4264c96SJakub Kicinski 			nfp_map = map_to_offmap(map)->dev_priv;
4254ab01f4acSJakub Kicinski 			id = nfp_map->tid;
4255ab01f4acSJakub Kicinski 		}
4256b4264c96SJakub Kicinski 
4257ab01f4acSJakub Kicinski 		meta1->insn.imm = id;
4258b4264c96SJakub Kicinski 		meta2->insn.imm = 0;
4259b4264c96SJakub Kicinski 	}
4260b4264c96SJakub Kicinski 
4261b4264c96SJakub Kicinski 	return 0;
4262b4264c96SJakub Kicinski }
4263b4264c96SJakub Kicinski 
42642314fe9eSJakub Kicinski static int nfp_bpf_ustore_calc(u64 *prog, unsigned int len)
4265fd068ddcSJakub Kicinski {
42662314fe9eSJakub Kicinski 	__le64 *ustore = (__force __le64 *)prog;
4267fd068ddcSJakub Kicinski 	int i;
4268fd068ddcSJakub Kicinski 
42692314fe9eSJakub Kicinski 	for (i = 0; i < len; i++) {
4270fd068ddcSJakub Kicinski 		int err;
4271fd068ddcSJakub Kicinski 
42722314fe9eSJakub Kicinski 		err = nfp_ustore_check_valid_no_ecc(prog[i]);
4273fd068ddcSJakub Kicinski 		if (err)
4274fd068ddcSJakub Kicinski 			return err;
4275fd068ddcSJakub Kicinski 
42762314fe9eSJakub Kicinski 		ustore[i] = cpu_to_le64(nfp_ustore_calc_ecc_insn(prog[i]));
4277fd068ddcSJakub Kicinski 	}
4278fd068ddcSJakub Kicinski 
4279fd068ddcSJakub Kicinski 	return 0;
4280fd068ddcSJakub Kicinski }
4281fd068ddcSJakub Kicinski 
428244a12eccSJakub Kicinski static void nfp_bpf_prog_trim(struct nfp_prog *nfp_prog)
428344a12eccSJakub Kicinski {
428444a12eccSJakub Kicinski 	void *prog;
428544a12eccSJakub Kicinski 
428644a12eccSJakub Kicinski 	prog = kvmalloc_array(nfp_prog->prog_len, sizeof(u64), GFP_KERNEL);
428744a12eccSJakub Kicinski 	if (!prog)
428844a12eccSJakub Kicinski 		return;
428944a12eccSJakub Kicinski 
429044a12eccSJakub Kicinski 	nfp_prog->__prog_alloc_len = nfp_prog->prog_len * sizeof(u64);
429144a12eccSJakub Kicinski 	memcpy(prog, nfp_prog->prog, nfp_prog->__prog_alloc_len);
429244a12eccSJakub Kicinski 	kvfree(nfp_prog->prog);
429344a12eccSJakub Kicinski 	nfp_prog->prog = prog;
429444a12eccSJakub Kicinski }
429544a12eccSJakub Kicinski 
4296c6c580d7SJakub Kicinski int nfp_bpf_jit(struct nfp_prog *nfp_prog)
4297d9ae7f2bSJakub Kicinski {
4298d9ae7f2bSJakub Kicinski 	int ret;
4299d9ae7f2bSJakub Kicinski 
4300b4264c96SJakub Kicinski 	ret = nfp_bpf_replace_map_ptrs(nfp_prog);
4301b4264c96SJakub Kicinski 	if (ret)
4302b4264c96SJakub Kicinski 		return ret;
4303b4264c96SJakub Kicinski 
4304d9ae7f2bSJakub Kicinski 	ret = nfp_bpf_optimize(nfp_prog);
4305d9ae7f2bSJakub Kicinski 	if (ret)
43069314c442SJakub Kicinski 		return ret;
4307d9ae7f2bSJakub Kicinski 
4308d9ae7f2bSJakub Kicinski 	ret = nfp_translate(nfp_prog);
4309d9ae7f2bSJakub Kicinski 	if (ret) {
4310d9ae7f2bSJakub Kicinski 		pr_err("Translation failed with error %d (translated: %u)\n",
4311d9ae7f2bSJakub Kicinski 		       ret, nfp_prog->n_translated);
43129314c442SJakub Kicinski 		return -EINVAL;
4313d9ae7f2bSJakub Kicinski 	}
4314d9ae7f2bSJakub Kicinski 
431544a12eccSJakub Kicinski 	nfp_bpf_prog_trim(nfp_prog);
431644a12eccSJakub Kicinski 
43172314fe9eSJakub Kicinski 	return ret;
4318d9ae7f2bSJakub Kicinski }
43191549921dSJakub Kicinski 
43201549921dSJakub Kicinski void nfp_bpf_jit_prepare(struct nfp_prog *nfp_prog, unsigned int cnt)
43211549921dSJakub Kicinski {
43221549921dSJakub Kicinski 	struct nfp_insn_meta *meta;
43231549921dSJakub Kicinski 
43241549921dSJakub Kicinski 	/* Another pass to record jump information. */
43251549921dSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
43261549921dSJakub Kicinski 		struct nfp_insn_meta *dst_meta;
4327e3b49dc6SQuentin Monnet 		u64 code = meta->insn.code;
4328e3b49dc6SQuentin Monnet 		unsigned int dst_idx;
4329e3b49dc6SQuentin Monnet 		bool pseudo_call;
43301549921dSJakub Kicinski 
4331e3b49dc6SQuentin Monnet 		if (BPF_CLASS(code) != BPF_JMP)
4332e3b49dc6SQuentin Monnet 			continue;
4333e3b49dc6SQuentin Monnet 		if (BPF_OP(code) == BPF_EXIT)
4334e3b49dc6SQuentin Monnet 			continue;
4335e3b49dc6SQuentin Monnet 		if (is_mbpf_helper_call(meta))
4336e3b49dc6SQuentin Monnet 			continue;
43371549921dSJakub Kicinski 
4338e3b49dc6SQuentin Monnet 		/* If opcode is BPF_CALL at this point, this can only be a
4339e3b49dc6SQuentin Monnet 		 * BPF-to-BPF call (a.k.a pseudo call).
4340e3b49dc6SQuentin Monnet 		 */
4341e3b49dc6SQuentin Monnet 		pseudo_call = BPF_OP(code) == BPF_CALL;
4342e3b49dc6SQuentin Monnet 
4343e3b49dc6SQuentin Monnet 		if (pseudo_call)
4344e3b49dc6SQuentin Monnet 			dst_idx = meta->n + 1 + meta->insn.imm;
4345e3b49dc6SQuentin Monnet 		else
4346e3b49dc6SQuentin Monnet 			dst_idx = meta->n + 1 + meta->insn.off;
4347e3b49dc6SQuentin Monnet 
4348e3b49dc6SQuentin Monnet 		dst_meta = nfp_bpf_goto_meta(nfp_prog, meta, dst_idx, cnt);
4349e3b49dc6SQuentin Monnet 
4350e3b49dc6SQuentin Monnet 		if (pseudo_call)
4351e3b49dc6SQuentin Monnet 			dst_meta->flags |= FLAG_INSN_IS_SUBPROG_START;
4352e3b49dc6SQuentin Monnet 
43531549921dSJakub Kicinski 		dst_meta->flags |= FLAG_INSN_IS_JUMP_DST;
4354e3b49dc6SQuentin Monnet 		meta->jmp_dst = dst_meta;
43551549921dSJakub Kicinski 	}
43561549921dSJakub Kicinski }
43572314fe9eSJakub Kicinski 
435874801e50SQuentin Monnet bool nfp_bpf_supported_opcode(u8 code)
435974801e50SQuentin Monnet {
436074801e50SQuentin Monnet 	return !!instr_cb[code];
436174801e50SQuentin Monnet }
436274801e50SQuentin Monnet 
43632314fe9eSJakub Kicinski void *nfp_bpf_relo_for_vnic(struct nfp_prog *nfp_prog, struct nfp_bpf_vnic *bv)
43642314fe9eSJakub Kicinski {
43652314fe9eSJakub Kicinski 	unsigned int i;
43662314fe9eSJakub Kicinski 	u64 *prog;
43672314fe9eSJakub Kicinski 	int err;
43682314fe9eSJakub Kicinski 
43692314fe9eSJakub Kicinski 	prog = kmemdup(nfp_prog->prog, nfp_prog->prog_len * sizeof(u64),
43702314fe9eSJakub Kicinski 		       GFP_KERNEL);
43712314fe9eSJakub Kicinski 	if (!prog)
43722314fe9eSJakub Kicinski 		return ERR_PTR(-ENOMEM);
43732314fe9eSJakub Kicinski 
43742314fe9eSJakub Kicinski 	for (i = 0; i < nfp_prog->prog_len; i++) {
43752314fe9eSJakub Kicinski 		enum nfp_relo_type special;
437677a3d311SJakub Kicinski 		u32 val;
4377389f263bSQuentin Monnet 		u16 off;
43782314fe9eSJakub Kicinski 
43792314fe9eSJakub Kicinski 		special = FIELD_GET(OP_RELO_TYPE, prog[i]);
43802314fe9eSJakub Kicinski 		switch (special) {
43812314fe9eSJakub Kicinski 		case RELO_NONE:
43822314fe9eSJakub Kicinski 			continue;
43832314fe9eSJakub Kicinski 		case RELO_BR_REL:
43842314fe9eSJakub Kicinski 			br_add_offset(&prog[i], bv->start_off);
43852314fe9eSJakub Kicinski 			break;
43862314fe9eSJakub Kicinski 		case RELO_BR_GO_OUT:
43872314fe9eSJakub Kicinski 			br_set_offset(&prog[i],
43882314fe9eSJakub Kicinski 				      nfp_prog->tgt_out + bv->start_off);
43892314fe9eSJakub Kicinski 			break;
43902314fe9eSJakub Kicinski 		case RELO_BR_GO_ABORT:
43912314fe9eSJakub Kicinski 			br_set_offset(&prog[i],
43922314fe9eSJakub Kicinski 				      nfp_prog->tgt_abort + bv->start_off);
43932314fe9eSJakub Kicinski 			break;
4394389f263bSQuentin Monnet 		case RELO_BR_GO_CALL_PUSH_REGS:
439544549623SQuentin Monnet 			if (!nfp_prog->tgt_call_push_regs) {
439644549623SQuentin Monnet 				pr_err("BUG: failed to detect subprogram registers needs\n");
439744549623SQuentin Monnet 				err = -EINVAL;
439844549623SQuentin Monnet 				goto err_free_prog;
439944549623SQuentin Monnet 			}
4400389f263bSQuentin Monnet 			off = nfp_prog->tgt_call_push_regs + bv->start_off;
4401389f263bSQuentin Monnet 			br_set_offset(&prog[i], off);
4402389f263bSQuentin Monnet 			break;
4403389f263bSQuentin Monnet 		case RELO_BR_GO_CALL_POP_REGS:
440444549623SQuentin Monnet 			if (!nfp_prog->tgt_call_pop_regs) {
440544549623SQuentin Monnet 				pr_err("BUG: failed to detect subprogram registers needs\n");
440644549623SQuentin Monnet 				err = -EINVAL;
440744549623SQuentin Monnet 				goto err_free_prog;
440844549623SQuentin Monnet 			}
4409389f263bSQuentin Monnet 			off = nfp_prog->tgt_call_pop_regs + bv->start_off;
4410389f263bSQuentin Monnet 			br_set_offset(&prog[i], off);
4411389f263bSQuentin Monnet 			break;
44122314fe9eSJakub Kicinski 		case RELO_BR_NEXT_PKT:
44132314fe9eSJakub Kicinski 			br_set_offset(&prog[i], bv->tgt_done);
44142314fe9eSJakub Kicinski 			break;
441577a3d311SJakub Kicinski 		case RELO_BR_HELPER:
441677a3d311SJakub Kicinski 			val = br_get_offset(prog[i]);
441777a3d311SJakub Kicinski 			val -= BR_OFF_RELO;
441877a3d311SJakub Kicinski 			switch (val) {
441977a3d311SJakub Kicinski 			case BPF_FUNC_map_lookup_elem:
442077a3d311SJakub Kicinski 				val = nfp_prog->bpf->helpers.map_lookup;
442177a3d311SJakub Kicinski 				break;
442244d65a47SJakub Kicinski 			case BPF_FUNC_map_update_elem:
442344d65a47SJakub Kicinski 				val = nfp_prog->bpf->helpers.map_update;
442444d65a47SJakub Kicinski 				break;
4425bfee64deSJakub Kicinski 			case BPF_FUNC_map_delete_elem:
4426bfee64deSJakub Kicinski 				val = nfp_prog->bpf->helpers.map_delete;
4427bfee64deSJakub Kicinski 				break;
44289816dd35SJakub Kicinski 			case BPF_FUNC_perf_event_output:
44299816dd35SJakub Kicinski 				val = nfp_prog->bpf->helpers.perf_event_output;
44309816dd35SJakub Kicinski 				break;
443177a3d311SJakub Kicinski 			default:
443277a3d311SJakub Kicinski 				pr_err("relocation of unknown helper %d\n",
443377a3d311SJakub Kicinski 				       val);
443477a3d311SJakub Kicinski 				err = -EINVAL;
443577a3d311SJakub Kicinski 				goto err_free_prog;
443677a3d311SJakub Kicinski 			}
443777a3d311SJakub Kicinski 			br_set_offset(&prog[i], val);
443877a3d311SJakub Kicinski 			break;
443977a3d311SJakub Kicinski 		case RELO_IMMED_REL:
444077a3d311SJakub Kicinski 			immed_add_value(&prog[i], bv->start_off);
444177a3d311SJakub Kicinski 			break;
44422314fe9eSJakub Kicinski 		}
44432314fe9eSJakub Kicinski 
44442314fe9eSJakub Kicinski 		prog[i] &= ~OP_RELO_TYPE;
44452314fe9eSJakub Kicinski 	}
44462314fe9eSJakub Kicinski 
44472314fe9eSJakub Kicinski 	err = nfp_bpf_ustore_calc(prog, nfp_prog->prog_len);
44482314fe9eSJakub Kicinski 	if (err)
44492314fe9eSJakub Kicinski 		goto err_free_prog;
44502314fe9eSJakub Kicinski 
44512314fe9eSJakub Kicinski 	return prog;
44522314fe9eSJakub Kicinski 
44532314fe9eSJakub Kicinski err_free_prog:
44542314fe9eSJakub Kicinski 	kfree(prog);
44552314fe9eSJakub Kicinski 	return ERR_PTR(err);
44562314fe9eSJakub Kicinski }
4457